Microsoft CVE Summary

This report contains detail for the following vulnerabilities:

CVE Issued by Tag CVE ID CVE Title
Microsoft.NET and Visual Studio CVE-2024-38168 .NET and Visual Studio Denial of Service Vulnerability
Microsoft.NET and Visual Studio CVE-2024-38167 .NET and Visual Studio Information Disclosure Vulnerability
MicrosoftAzure Connected Machine Agent CVE-2024-38162 Azure Connected Machine Agent Elevation of Privilege Vulnerability
MicrosoftAzure Connected Machine Agent CVE-2024-38098 Azure Connected Machine Agent Elevation of Privilege Vulnerability
MicrosoftAzure CycleCloud CVE-2024-38195 Azure CycleCloud Remote Code Execution Vulnerability
MicrosoftAzure Health Bot CVE-2024-38109 Azure Health Bot Elevation of Privilege Vulnerability
MicrosoftAzure IoT SDK CVE-2024-38158 Azure IoT SDK Remote Code Execution Vulnerability
MicrosoftAzure IoT SDK CVE-2024-38157 Azure IoT SDK Remote Code Execution Vulnerability
MicrosoftAzure Stack CVE-2024-38108 Azure Stack Hub Spoofing Vulnerability
MicrosoftAzure Stack CVE-2024-38201 Azure Stack Hub Elevation of Privilege Vulnerability
MicrosoftLine Printer Daemon Service (LPD) CVE-2024-38199 Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-26900 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39473 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39474 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42074 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42073 Unknown
security@golang.orgMariner CVE-2023-29402 Unknown
cve@mitre.orgMariner CVE-2007-4559 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39480 Unknown
cve@mitre.orgMariner CVE-2022-36648 Unknown
security@golang.orgMariner CVE-2023-29404 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-36288 Unknown
cve@mitre.orgMariner CVE-2019-20907 Unknown
secalert@redhat.comMariner CVE-2019-3816 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-0853 Unknown
report@snyk.ioMariner CVE-2021-23336 Unknown
cve@mitre.orgMariner CVE-2017-17522 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-2004 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42075 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-38662 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42078 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-2398 Unknown
cve@mitre.orgMariner CVE-2017-18207 Unknown
cve@mitre.orgMariner CVE-2019-9674 Unknown
secalert@redhat.comMariner CVE-2021-4206 Unknown
secalert@redhat.comMariner CVE-2021-4207 Unknown
secalert@redhat.comMariner CVE-2022-26353 Unknown
cna@python.orgMariner CVE-2024-0397 Unknown
secalert@redhat.comMariner CVE-2021-3929 Unknown
secalert@redhat.comMariner CVE-2021-4158 Unknown
cve@mitre.orgMariner CVE-2022-35414 Unknown
security@golang.orgMariner CVE-2023-45288 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-38571 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42077 Unknown
secalert@redhat.comMariner CVE-2023-3354 Unknown
secalert@redhat.comMariner CVE-2022-3872 Unknown
secalert@redhat.comMariner CVE-2022-4144 Unknown
security-advisories@github.comMariner CVE-2024-37298 Unknown
cve@mitre.orgMariner CVE-2024-39331 Unknown
cve@mitre.orgMariner CVE-2021-43565 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39277 Unknown
secalert@redhat.comMariner CVE-2019-3833 Unknown
secalert@redhat.comMariner CVE-2024-6655 Unknown
2499f714-1537-4658-8207-48ae4bb9eae9Mariner CVE-2024-2466 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-38780 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39495 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-40902 Unknown
security-advisories@github.comMariner CVE-2024-41110 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39292 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39482 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39484 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39476 Unknown
cve@mitre.orgMariner CVE-2024-23722 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42082 Unknown
security@apache.orgMariner CVE-2024-40898 Unknown
cve@mitre.orgMariner CVE-2022-29526 Unknown
secalert@redhat.comMariner CVE-2022-26354 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2022-48788 Unknown
secalert@redhat.comMariner CVE-2022-2962 Unknown
secalert@redhat.comMariner CVE-2022-3165 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-38583 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42080 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42076 Unknown
security@golang.orgMariner CVE-2022-41722 Unknown
cve@mitre.orgMariner CVE-2024-38428 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42068 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39493 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42070 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39489 Unknown
security@hashicorp.comMariner CVE-2024-6257 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42237 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42071 Unknown
cve@mitre.orgMariner CVE-2024-37371 Unknown
cve@mitre.orgMariner CVE-2024-37370 Unknown
cve@mitre.orgMariner CVE-2024-26461 Unknown
security@hashicorp.comMariner CVE-2024-6104 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42072 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2022-48841 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39485 Unknown
cve@mitre.orgMariner CVE-2023-52340 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-42083 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39483 Unknown
416baaa9-dc9f-4396-8d5f-8c081fb06d67Mariner CVE-2024-39475 Unknown
secalert@redhat.comMariner CVE-2021-3750 Unknown
secalert@redhat.comMariner CVE-2022-0358 Unknown
MicrosoftMicrosoft Bluetooth Driver CVE-2024-38123 Windows Bluetooth Driver Information Disclosure Vulnerability
MicrosoftMicrosoft Copilot Studio CVE-2024-38206 Microsoft Copilot Studio Information Disclosure Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-38166 Microsoft Dynamics 365 Cross-site Scripting Vulnerability
MicrosoftMicrosoft Dynamics CVE-2024-38211 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
ChromeMicrosoft Edge (Chromium-based) CVE-2024-7256 Chromium: CVE-2024-7256 Insufficient data validation in Dawn
ChromeMicrosoft Edge (Chromium-based) CVE-2024-7536 Chromium: CVE-2024-7550 Type Confusion in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2024-6990 Chromium: CVE-2024-6990 Uninitialized Use in Dawn
ChromeMicrosoft Edge (Chromium-based) CVE-2024-7255 Chromium: CVE-2024-7255 Out of bounds read in WebTransport
ChromeMicrosoft Edge (Chromium-based) CVE-2024-7534 Chromium: CVE-2024-7535 Inappropriate implementation in V8
ChromeMicrosoft Edge (Chromium-based) CVE-2024-7532 Chromium: CVE-2024-7533 Use after free in Sharing
ChromeMicrosoft Edge (Chromium-based) CVE-2024-7550 Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE
ChromeMicrosoft Edge (Chromium-based) CVE-2024-7535 Chromium: CVE-2024-7536 Use after free in WebAudio
ChromeMicrosoft Edge (Chromium-based) CVE-2024-7533 Chromium: CVE-2024-7534 Heap buffer overflow in Layout
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-38218 Microsoft Edge (HTML-based) Memory Corruption Vulnerability
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-38219 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
MicrosoftMicrosoft Edge (Chromium-based) CVE-2024-38222 Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
MicrosoftMicrosoft Local Security Authority Server (lsasrv) CVE-2024-38118 Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
MicrosoftMicrosoft Local Security Authority Server (lsasrv) CVE-2024-38122 Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
MicrosoftMicrosoft Office CVE-2024-38200 Microsoft Office Spoofing Vulnerability
MicrosoftMicrosoft Office CVE-2024-38084 Microsoft OfficePlus Elevation of Privilege Vulnerability
MicrosoftMicrosoft Office Excel CVE-2024-38172 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Excel CVE-2024-38170 Microsoft Excel Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Outlook CVE-2024-38173 Microsoft Outlook Remote Code Execution Vulnerability
MicrosoftMicrosoft Office PowerPoint CVE-2024-38171 Microsoft PowerPoint Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Project CVE-2024-38189 Microsoft Project Remote Code Execution Vulnerability
MicrosoftMicrosoft Office Visio CVE-2024-38169 Microsoft Office Visio Remote Code Execution Vulnerability
MicrosoftMicrosoft Streaming Service CVE-2024-38134 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
MicrosoftMicrosoft Streaming Service CVE-2024-38144 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
MicrosoftMicrosoft Streaming Service CVE-2024-38125 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
MicrosoftMicrosoft Teams CVE-2024-38197 Microsoft Teams for iOS Spoofing Vulnerability
MicrosoftMicrosoft WDAC OLE DB provider for SQL CVE-2024-38152 Windows OLE Remote Code Execution Vulnerability
MicrosoftMicrosoft Windows DNS CVE-2024-37968 Windows DNS Spoofing Vulnerability
MicrosoftReliable Multicast Transport Driver (RMCAST) CVE-2024-38140 Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2024-38141 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows Ancillary Function Driver for WinSock CVE-2024-38193 Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
MicrosoftWindows App Installer CVE-2024-38177 Windows App Installer Spoofing Vulnerability
MicrosoftWindows Clipboard Virtual Channel Extension CVE-2024-38131 Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
MicrosoftWindows Cloud Files Mini Filter Driver CVE-2024-38215 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
MicrosoftWindows Common Log File System Driver CVE-2024-38196 Windows Common Log File System Driver Elevation of Privilege Vulnerability
MicrosoftWindows Compressed Folder CVE-2024-38165 Windows Compressed Folder Tampering Vulnerability
MicrosoftWindows Deployment Services CVE-2024-38138 Windows Deployment Services Remote Code Execution Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-38150 Windows DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows DWM Core Library CVE-2024-38147 Microsoft DWM Core Library Elevation of Privilege Vulnerability
MicrosoftWindows Initial Machine Configuration CVE-2024-38223 Windows Initial Machine Configuration Elevation of Privilege Vulnerability
MicrosoftWindows IP Routing Management Snapin CVE-2024-38114 Windows IP Routing Management Snapin Remote Code Execution Vulnerability
MicrosoftWindows IP Routing Management Snapin CVE-2024-38116 Windows IP Routing Management Snapin Remote Code Execution Vulnerability
MicrosoftWindows IP Routing Management Snapin CVE-2024-38115 Windows IP Routing Management Snapin Remote Code Execution Vulnerability
MicrosoftWindows Kerberos CVE-2024-29995 Windows Kerberos Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-38151 Windows Kernel Information Disclosure Vulnerability
MicrosoftWindows Kernel CVE-2024-38133 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-38127 Windows Hyper-V Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-38153 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel CVE-2024-38106 Windows Kernel Elevation of Privilege Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2024-38187 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2024-38191 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2024-38184 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2024-38186 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
MicrosoftWindows Kernel-Mode Drivers CVE-2024-38185 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
MicrosoftWindows Layer-2 Bridge Network Driver CVE-2024-38146 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
MicrosoftWindows Layer-2 Bridge Network Driver CVE-2024-38145 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
MicrosoftWindows Mark of the Web (MOTW) CVE-2024-38213 Windows Mark of the Web Security Feature Bypass Vulnerability
MicrosoftWindows Mobile Broadband CVE-2024-38161 Windows Mobile Broadband Driver Remote Code Execution Vulnerability
MicrosoftWindows Network Address Translation (NAT) CVE-2024-38132 Windows Network Address Translation (NAT) Denial of Service Vulnerability
MicrosoftWindows Network Address Translation (NAT) CVE-2024-38126 Windows Network Address Translation (NAT) Denial of Service Vulnerability
MicrosoftWindows Network Virtualization CVE-2024-38160 Windows Network Virtualization Remote Code Execution Vulnerability
MicrosoftWindows Network Virtualization CVE-2024-38159 Windows Network Virtualization Remote Code Execution Vulnerability
MicrosoftWindows NT OS Kernel CVE-2024-38135 Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
MicrosoftWindows NTFS CVE-2024-38117 NTFS Elevation of Privilege Vulnerability
MicrosoftWindows Power Dependency Coordinator CVE-2024-38107 Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
MicrosoftWindows Print Spooler Components CVE-2024-38198 Windows Print Spooler Elevation of Privilege Vulnerability
MicrosoftWindows Resource Manager CVE-2024-38137 Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
MicrosoftWindows Resource Manager CVE-2024-38136 Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-38130 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-38128 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-38154 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-38121 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-38214 Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
MicrosoftWindows Routing and Remote Access Service (RRAS) CVE-2024-38120 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
MicrosoftWindows Scripting CVE-2024-38178 Scripting Engine Memory Corruption Vulnerability
Red Hat, Inc.Windows Secure Boot CVE-2022-3775 Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences
Red Hat, Inc.Windows Secure Boot CVE-2023-40547 Redhat: CVE-2023-40547 Shim - RCE in HTTP boot support may lead to secure boot bypass
Red Hat, Inc.Windows Secure Boot CVE-2022-2601 Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
MicrosoftWindows Secure Kernel Mode CVE-2024-21302 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
MicrosoftWindows Secure Kernel Mode CVE-2024-38142 Windows Secure Kernel Mode Elevation of Privilege Vulnerability
MicrosoftWindows Security Center CVE-2024-38155 Security Center Broker Information Disclosure Vulnerability
MicrosoftWindows SmartScreen CVE-2024-38180 Windows SmartScreen Security Feature Bypass Vulnerability
MicrosoftWindows TCP/IP CVE-2024-38063 Windows TCP/IP Remote Code Execution Vulnerability
MicrosoftWindows Transport Security Layer (TLS) CVE-2024-38148 Windows Secure Channel Denial of Service Vulnerability
MicrosoftWindows Update Stack CVE-2024-38202 Windows Update Stack Elevation of Privilege Vulnerability
MicrosoftWindows Update Stack CVE-2024-38163 Windows Update Stack Elevation of Privilege Vulnerability
MicrosoftWindows WLAN Auto Config Service CVE-2024-38143 Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability

CVE-2022-2601 - Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-2601
MITRE
NVD

Issuing CNA: Red Hat, Inc.

CVE Title: Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
CVSS:

CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:

Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Why is this Redhat CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in the Linux GRUB2 boot loader, a boot loader designed to support Secure Boot on systems that are running Linux. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable to this security feature bypass using the Linux GRUB2 boot loader. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


Will this update affect my ability to boot Linux after applying this update?

To address this security issue, Windows will apply a Secure Boot Advanced Targeting (SBAT) update to block vulnerable Linux boot loaders that could have an impact on Windows security. The SBAT value is not applied to dual-boot systems that boot both Windows and Linux and should not affect these systems. You might find that older Linux distribution ISOs will not boot. If this occurs, work with your Linux vendor to get an update.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-2601
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM grub2 (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2.06-14 Unknown None
Azure Linux 3.0 x64 grub2 (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2.06-14 Unknown None
CBL Mariner 1.0 ARM grub2 (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2.06~rc1-9 Unknown None
CBL Mariner 1.0 x64 grub2 (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2.06~rc1-9 Unknown None
CBL Mariner 2.0 ARM grub2 (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2.06-8 Unknown None
CBL Mariner 2.0 x64 grub2 (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
2.06-8 Unknown None
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Security Feature Bypass 5040448 Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Security Feature Bypass 5040448 Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Security Feature Bypass 5040434
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Security Feature Bypass 5040434
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Security Feature Bypass 5040427
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Security Feature Bypass 5040427
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Security Feature Bypass 5040427
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Security Feature Bypass
5040427
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Security Feature Bypass
5040427
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Security Feature Bypass
5040427
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Security Feature Bypass 5040431
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Security Feature Bypass 5040431
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Security Feature Bypass 5040442 Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Security Feature Bypass 5040442 Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Security Feature Bypass 5040442 Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Security Feature Bypass 5040442 Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Security Feature Bypass 5040435
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Security Feature Bypass 5040435
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.26100.1457
Yes 5041571
Windows Server 2012 5041851 (Monthly Rollup) Important Security Feature Bypass 5040485
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Security Feature Bypass 5040485
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Security Feature Bypass 5040456
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Security Feature Bypass 5040456
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Security Feature Bypass 5040434
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Security Feature Bypass 5040434
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Security Feature Bypass 5040437
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Security Feature Bypass 5040437
Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Security Feature Bypass 5040438 Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-2601 Zhang Boyang


CVE-2024-38108 - Azure Stack Hub Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38108
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Stack Hub Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.3/TemporalScore:8.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

A cross-site scripting vulnerability existed in virtual public IP address that impacted related endpoints. For more information on the impacted virtual public IP address, see here: What is IP address 168.63.129.16? | Microsoft Learn. An unauthenticated attacker could exploit this vulnerability by getting the victim to load malicious code into their web browser on the virtual machine, allowing the attacker to leverage an implicit identity of the virtual machine. The victim's web browser then would determine which host endpoints are accessible.


According to CVSS metrics the user interaction is required (UI:R). What interaction would a user have to do?

A user (victim) logged on to a virtual machine would need to be tricked for the virtual machine to explicitly download and execute a malicious code in their web browser.


According to the CVSS metric, the successful exploitation of this vulnerability could lead to a scope change (S:C). What does this mean for this vulnerability?

By sending a specially crafted request to the vulnerable virtual public IP address, the attacker is able to load malicious code into a victim's browser without having any direct access or connection.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38108
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Stack Hub Release Notes (Security Update) Important Spoofing None Base: 9.3
Temporal: 8.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N/E:U/RL:O/RC:C
1.2311.1.22 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38108 Felix Boulet with Centre gouvernemental de cyberdéfense (CGCD)


Mathieu Fiore Laroche with Centre gouvernemental de cyberdéfense (CGCD)


CVE-2024-38123 - Windows Bluetooth Driver Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38123
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Bluetooth Driver Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.4/TemporalScore:3.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

Exploiting this vulnerability could allow the disclosure of certain kernel memory content.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38123
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 4.4
Temporal: 3.9
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38123 Microsoft Offensive Research & Security Engineering (MORSE)


CVE-2024-38159 - Windows Network Virtualization Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38159
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Network Virtualization Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

To successfully exploit this vulnerability, an attacker or the targeted user would need to achieve a high level of control over a machine, as the attack requires access to processes typically restricted from average users.

Essentially, the exploitation necessitates elevated privileges on the compromised machine due to the requirement of manipulating processes beyond the reach of standard user permissions.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by taking advantage of the unchecked return value in the wnv.sys component of Windows Server 2016. By manipulating the content of the Memory Descriptor List (MDL), the attacker could cause unauthorized memory writes or even free a valid block currently in use, leading to a critical guest-to-host escape.


According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content.


Mitigations:

The following mitigating factors might be helpful in your situation:

  • Ensuring that the virtual machine (VM) is running on the VMware hypervisor exclusively, as it needs to be capable of nested virtualization.
  • Disabling Hyper-V and its dependent features (VBS and its components) on the host where the VM will run is also crucial.
  • Renaming the hypervisor binary (C:\Windows\System32\hvix64.exe) to prevent it from loading at boot time can also help mitigate the issue.

Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38159
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38159 Anonymous


CVE-2024-38160 - Windows Network Virtualization Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38160
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Network Virtualization Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content.


According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

To successfully exploit this vulnerability, an attacker or the targeted user would need to achieve a high level of control over a machine, as the attack requires access to processes typically restricted from average users.

Essentially, the exploitation necessitates elevated privileges on the compromised machine due to the requirement of manipulating processes beyond the reach of standard user permissions.


How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by taking advantage of the unchecked return value in the wnv.sys component of Windows Server 2016. By manipulating the content of the Memory Descriptor List (MDL), the attacker could cause unauthorized memory writes or even free a valid block currently in use, leading to a critical guest-to-host escape.


Mitigations:

The following mitigating factors might be helpful in your situation:

  • Ensuring that the virtual machine (VM) is running on the VMware hypervisor exclusively, as it needs to be capable of nested virtualization.
  • Disabling Hyper-V and its dependent features (VBS and its components) on the host where the VM will run is also crucial.
  • Renaming the hypervisor binary (C:\Windows\System32\hvix64.exe) to prevent it from loading at boot time can also help mitigate the issue.

Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38160
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38160 Anonymous


CVE-2024-38161 - Windows Mobile Broadband Driver Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38161
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an unauthenticated attacker needs to physically connect a malicious USB device to the victim's machine


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38161
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5040430 (Security Update) Important Remote Code Execution 5039217
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for ARM64-based Systems 5040430 (Security Update) Important Remote Code Execution 5039217
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for x64-based Systems 5040430 (Security Update) Important Remote Code Execution 5039217
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 21H2 for 32-bit Systems 5040427 (Security Update) Important Remote Code Execution 5039211
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for ARM64-based Systems 5040427 (Security Update) Important Remote Code Execution 5039211
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for x64-based Systems 5040427 (Security Update) Important Remote Code Execution 5039211
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 22H2 for 32-bit Systems 5040427 (Security Update) Important Remote Code Execution
5039211
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for ARM64-based Systems 5040427 (Security Update) Important Remote Code Execution
5039211
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for x64-based Systems 5040427 (Security Update) Important Remote Code Execution
5039211
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 11 version 21H2 for ARM64-based Systems 5040431 (Security Update) Important Remote Code Execution 5039213
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 version 21H2 for x64-based Systems 5040431 (Security Update) Important Remote Code Execution 5039213
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 Version 22H2 for ARM64-based Systems 5040442 (Security Update) Important Remote Code Execution 5039212
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 22H2 for x64-based Systems 5040442 (Security Update) Important Remote Code Execution 5039212
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 23H2 for ARM64-based Systems 5040442 (Security Update) Important Remote Code Execution
5039212
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows 11 Version 23H2 for x64-based Systems 5040442 (Security Update) Important Remote Code Execution
5039212
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows Server 2019 5040430 (Security Update) Important Remote Code Execution 5039217
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2019 (Server Core installation) 5040430 (Security Update) Important Remote Code Execution 5039217
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38161 Wen with CyberKunLun


CVE-2024-38167 - .NET and Visual Studio Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38167
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET and Visual Studio Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited the vulnerability could read targeted email messages.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of this vulnerability requires that a user trigger the payload in the application.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38167
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 8.0 5042132 (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
8.0.8 Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
17.10.6 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
17.6.18 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Information Disclosure None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
17.8.13 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38167

CVE-2024-38168 - .NET and Visual Studio Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38168
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: .NET and Visual Studio Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38168
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
.NET 8.0 5042132 (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
8.0.8 Maybe None
Microsoft Visual Studio 2022 version 17.10 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.10.6 Maybe None
Microsoft Visual Studio 2022 version 17.6 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.6.18 Maybe None
Microsoft Visual Studio 2022 version 17.8 Release Notes (Security Update) Important Denial of Service None Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
17.8.13 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38168 Brennan Conroy of Microsoft Corporation


CVE-2024-38172 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38172
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38172
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.88.24081116 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38172 an0nym0us


CVE-2024-38178 - Scripting Engine Memory Corruption Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38178
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Scripting Engine Memory Corruption Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.0
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an authenticated client to click a link in order for an unauthenticated attacker to initiate remote code execution.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to first prepare the target so that it uses Edge in Internet Explorer Mode.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38178
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2012 R2 5041828 (Monthly Rollup)
5041770 (IE Cumulative)
Important Remote Code Execution 5040456

5040426
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22134

1.001
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup)
5041770 (IE Cumulative)
Important Remote Code Execution 5040456

5040426
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22134

1.001
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 7.5
Temporal: 7.0
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38178 AhnLab and National Cyber Security Center(NCSC), Republic of Korea


AhnLab


National Cyber Security Center(NCSC), Republic of Korea


CVE-2024-38184 - Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38184
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker could use this vulnerability to elevate privileges from a Low Integrity Level in a contained ("sandboxed") execution environment to a Medium Integrity Level or a High Integrity Level.

Please refer to AppContainer isolation and Mandatory Integrity Control for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38184
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1607 for x64-based Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1809 for 32-bit Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for ARM64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for x64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 21H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 22H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 11 version 21H2 for ARM64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 version 21H2 for x64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 Version 22H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 22H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 23H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows 11 Version 23H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows Server 2016 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2016 (Server Core installation) 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2019 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2019 (Server Core installation) 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2022 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022 (Server Core installation) 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022, 23H2 Edition (Server Core installation) 5040438 (Security Update) Important Elevation of Privilege 5039236
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1009
Yes 5040438

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38184 Philippe Laulheret with Cisco Talos


CVE-2024-38191 - Kernel Streaming Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38191
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38191
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5040448 (Security Update) Important Elevation of Privilege 5039225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20710
Yes 5040448
Windows 10 for x64-based Systems 5040448 (Security Update) Important Elevation of Privilege 5039225
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20710
Yes 5040448
Windows 10 Version 1607 for 32-bit Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1607 for x64-based Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1809 for 32-bit Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for ARM64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for x64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 21H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 22H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 11 version 21H2 for ARM64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 version 21H2 for x64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 Version 22H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 22H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 23H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows 11 Version 23H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows Server 2008 for 32-bit Systems Service Pack 2 5040499 (Monthly Rollup)
5040490 (Security Only)
Important Elevation of Privilege 5039245
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22769
Yes 5040499
5040490
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5040499 (Monthly Rollup)
5040490 (Security Only)
Important Elevation of Privilege 5039245
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22769
Yes 5040499
5040490
Windows Server 2008 for x64-based Systems Service Pack 2 5040499 (Monthly Rollup)
5040490 (Security Only)
Important Elevation of Privilege 5039245
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22769
Yes 5040499
5040490
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5040499 (Monthly Rollup)
5040490 (Security Only)
Important Elevation of Privilege 5039245
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22769
Yes 5040499
5040490
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5040497 (Monthly Rollup)
5040498 (Security Only)
Important Elevation of Privilege 5039289
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27219
Yes 5040497
5040498
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5040497 (Monthly Rollup)
5040498 (Security Only)
Important Elevation of Privilege 5039289
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27219
Yes 5040497
5040498
Windows Server 2012 5040485 (Monthly Rollup) Important Elevation of Privilege 5039260
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24975
Yes 5040485
Windows Server 2012 (Server Core installation) 5040485 (Monthly Rollup) Important Elevation of Privilege 5039260
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.24975
Yes 5040485
Windows Server 2012 R2 5040456 (Monthly Rollup) Important Elevation of Privilege 5039294
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22074
Yes 5040456
Windows Server 2012 R2 (Server Core installation) 5040456 (Monthly Rollup) Important Elevation of Privilege 5039294
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22074
Yes 5040456
Windows Server 2016 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2016 (Server Core installation) 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2019 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2019 (Server Core installation) 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2022 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022 (Server Core installation) 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022, 23H2 Edition (Server Core installation) 5040438 (Security Update) Important Elevation of Privilege 5039236
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1009
Yes 5040438

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38191 Angelboy (@scwuaptx) with DEVCORE


CVE-2024-38193 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38193
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38193
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: N/A
Temporal: N/A
Vector: N/A
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: N/A
Temporal: N/A
Vector: N/A

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: N/A
Temporal: N/A
Vector: N/A
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: N/A
Temporal: N/A
Vector: N/A
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: N/A
Temporal: N/A
Vector: N/A
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38193 Luigino Camastra and Milánek with Gen Digital


CVE-2024-38196 - Windows Common Log File System Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38196
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38196
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38196 luckyu with MatrixCup


Anonymous with SSD Secure Disclosure


CVE-2024-38197 - Microsoft Teams for iOS Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38197
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Teams for iOS Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of confidentiality (C:L) and integrity (I:L) but does not impact availability (A:N)? What does that mean for this vulnerability?

The attacker is only able to modify the sender's name of Teams message (I:L) and through social engineering, attempt to trick the recipient into disclosing information (C:L). The availability of the product cannot be affected (A:N).


How do I get the update for Microsoft Teams for iOS?

  1. Tap the Settings icon
  2. Tap the** iTunes & App Store**
  3. Turn on AUTOMATIC DOWNLOADS for Apps

Alternatively

  1. Tap the** App Store** icon
  2. Scroll down to find Microsoft Teams
  3. Tap the Update button

How do I get the update for Teams for Android?

  1. Tap the Play Store icon on your home screen.
  2. Tap the circular account icon at the top right of the screen.
  3. Tap Manage apps & devices.
  4. Tap Updates available.
  5. Tap the Update button next to the Microsoft Teams app.

Is there a direct link on the web?

Yes: https://play.google.com/store/apps/details?id=com.microsoft.teams


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38197
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Teams for iOS Release Notes (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C
7.13.0 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38197 Andrey Charikov with Check Point Software Technologies


Oded Vanunu with Check Point Software Technologies


CVE-2024-38198 - Windows Print Spooler Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38198
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Print Spooler Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38198
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38198 nsfocus tianji lab with Matrix Cup


CVE-2024-38199 - Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38199
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An unauthenticated attacker could send a specially crafted print task to a shared vulnerable Windows Line Printer Daemon (LPD) service across a network. Successful exploitation could result in remote code execution on the server.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:

The following mitigating factors might be helpful in your situation:

  • Users are advised against installing or enabling the Line Printer Daemon (LPD) service.
  • The LPD is not installed or enabled on the systems by default.
  • The LPD has been announced as deprecated since Windows Server 2012. Please refer to: Features Removed or Deprecated in Windows Server 2012.

Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38199
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38199 Anonymous


CVE-2024-38201 - Azure Stack Hub Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38201
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Stack Hub Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H) and user interaction is required (UI:R). What does that mean for this vulnerability?

An attacker would need to trick the user to transfer a malicious JSON file and hope that user does not open and review it. If the user opens it, the user will see an invalid URL and not import it for his dashboard. But in a scenario where the user does import the malicious JSON file, the portal will not immediately send a token. Only in a corner case that a user configures the dashboard again from the portal will there be a token leak.


How could an attacker exploit this vulnerability?

An elevation of privilege vulnerability exists when the data widget of the Azure Stack Hub dashboard feature does not properly sanitize the connection URL. An unauthenticated attacker could exploit this vulnerability by sending crafted malicious URL to the user. This can be used to exfiltrate the authentication token of a user by sharing a dashboard publicly and then sending the link of the dashboard to the user. If that user clicks on the data widget, the token will leak and can be used by the attacker. The security update addresses vulnerability by helping to ensure that Azure Stack Hub dashboard properly sanitizes connection URLs.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38201
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Stack Hub Release Notes (Security Update) Important Elevation of Privilege None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.2311.1.22 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38201 Felix Boulet with Centre gouvernemental de cyberdéfense (CGCD)




CVE-2024-6990 - Chromium: CVE-2024-6990 Uninitialized Use in Dawn

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6990
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-6990 Uninitialized Use in Dawn
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.86 127.0.6533.88/89 8/1/2024

Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6990
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.86 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6990 None

CVE-2024-7256 - Chromium: CVE-2024-7256 Insufficient data validation in Dawn

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7256
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-7256 Insufficient data validation in Dawn
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.86 127.0.6533.88/89 8/1/2024

Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7256
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.86 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7256 None

CVE-2024-7255 - Chromium: CVE-2024-7255 Out of bounds read in WebTransport

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7255
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-7255 Out of bounds read in WebTransport
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.86 127.0.6533.88/89 8/1/2024

Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7255
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.86 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7255 None

CVE-2024-38213 - Windows Mark of the Web Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38213
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Mark of the Web Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

An attacker who successfully exploited this vulnerability could bypass the SmartScreen user experience.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published. This CVE was addressed by updates that were released in June 2024, but the CVE was inadvertently omitted from the June 2024 Security Updates. This is an informational change only. Customers who have already installed the June 2024 updates do not need to take any further action.


Moderate Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38213
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5039225 (Security Update) Moderate Security Feature Bypass 5037788 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.10240.20680 Yes None
Windows 10 for x64-based Systems 5039225 (Security Update) Moderate Security Feature Bypass 5037788 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.10240.20680 Yes None
Windows 10 Version 1607 for 32-bit Systems 5039214 (Security Update) Moderate Security Feature Bypass 5037763 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.14393.7070 Yes None
Windows 10 Version 1607 for x64-based Systems 5039214 (Security Update) Moderate Security Feature Bypass 5037763 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.14393.7070 Yes None
Windows 10 Version 1809 for 32-bit Systems 5039217 (Security Update) Moderate Security Feature Bypass 5037765
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.5936
Yes 5039217
Windows 10 Version 1809 for ARM64-based Systems 5039217 (Security Update) Moderate Security Feature Bypass 5037765
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.5936
Yes 5039217
Windows 10 Version 1809 for x64-based Systems 5039217 (Security Update) Moderate Security Feature Bypass 5037765
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.5936
Yes 5039217
Windows 10 Version 21H2 for 32-bit Systems 5039211 (Security Update) Moderate Security Feature Bypass 5037768
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.19044.4529
Yes 5039211
Windows 10 Version 21H2 for ARM64-based Systems 5039211 (Security Update) Moderate Security Feature Bypass 5037768
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.19044.4529
Yes 5039211
Windows 10 Version 21H2 for x64-based Systems 5039211 (Security Update) Moderate Security Feature Bypass 5037768
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.19044.4529
Yes 5039211
Windows 10 Version 22H2 for 32-bit Systems 5039211 (Security Update) Moderate Security Feature Bypass
5037768
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

10.0.19045.4529
Yes 5039211
Windows 10 Version 22H2 for ARM64-based Systems 5039211 (Security Update) Moderate Security Feature Bypass
5037768
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

10.0.19045.4529
Yes 5039211
Windows 10 Version 22H2 for x64-based Systems 5039211 (Security Update) Moderate Security Feature Bypass
5037768
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

10.0.19045.4529
Yes 5039211
Windows 11 version 21H2 for ARM64-based Systems 5039213 (Security Update) Moderate Security Feature Bypass 5037770
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.22000.3019
Yes 5039213
Windows 11 version 21H2 for x64-based Systems 5039213 (Security Update) Moderate Security Feature Bypass 5037770
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.22000.3019
Yes 5039213
Windows 11 Version 22H2 for ARM64-based Systems 5039212 (Security Update) Moderate Security Feature Bypass 5037771
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.22621.3737
Yes 5039212
Windows 11 Version 22H2 for x64-based Systems 5039212 (Security Update) Moderate Security Feature Bypass 5037771
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.22621.3737
Yes 5039212
Windows 11 Version 23H2 for ARM64-based Systems 5039212 (Security Update) Moderate Security Feature Bypass
5037771
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

10.0.22631.3737
Yes 5039212
Windows 11 Version 23H2 for x64-based Systems 5039212 (Security Update) Moderate Security Feature Bypass
5037771
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C

10.0.22631.3737
Yes 5039212
Windows Server 2012 5039260 (Monthly Rollup) Moderate Security Feature Bypass 5037778 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
6.2.9200.24919 Yes None
Windows Server 2012 (Server Core installation) 5039260 (Monthly Rollup) Moderate Security Feature Bypass 5037778 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
6.2.9200.24919 Yes None
Windows Server 2012 R2 5039294 (Monthly Rollup) Moderate Security Feature Bypass 5037823 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
6.3.9600.22023 Yes None
Windows Server 2012 R2 (Server Core installation) 5039294 (Monthly Rollup) Moderate Security Feature Bypass 5037823 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
6.3.9600.22023 Yes None
Windows Server 2016 5039214 (Security Update) Moderate Security Feature Bypass 5037763 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.14393.7070 Yes None
Windows Server 2016 (Server Core installation) 5039214 (Security Update) Moderate Security Feature Bypass 5037763 Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.14393.7070 Yes None
Windows Server 2019 5039217 (Security Update) Moderate Security Feature Bypass 5037765
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.5936
Yes 5039217
Windows Server 2019 (Server Core installation) 5039217 (Security Update) Moderate Security Feature Bypass 5037765
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.17763.5936
Yes 5039217
Windows Server 2022 5039227 (Security Update)
5039330 (Security Hotpatch Update)
Moderate Security Feature Bypass 5037782

5037848
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.20348.2527

10.0.20348.2522
Yes 5039227
Windows Server 2022 (Server Core installation) 5039227 (Security Update)
5039330 (Security Hotpatch Update)
Moderate Security Feature Bypass 5037782

5037848
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.20348.2527

10.0.20348.2522
Yes 5039227
Windows Server 2022, 23H2 Edition (Server Core installation) 5039236 (Security Update) Moderate Security Feature Bypass 5037781
Base: 6.5
Temporal: 6.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C
10.0.25398.950
Yes 5039236

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38213 Peter Girnus (@gothburz) of Trend Micro with Trend Micro


CVE-2024-7536 - Chromium: CVE-2024-7550 Type Confusion in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7536
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-7550 Type Confusion in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.98 127.0.6533.99/.100 8/8/2024

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7536
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7536 None

CVE-2024-7535 - Chromium: CVE-2024-7536 Use after free in WebAudio

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7535
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-7536 Use after free in WebAudio
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.98 127.0.6533.99/.100 8/8/2024

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7535
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7535 None

CVE-2024-7550 - Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7550
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.98 127.0.6533.99/.100 8/8/2024

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7550
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7550 None

CVE-2024-7532 - Chromium: CVE-2024-7533 Use after free in Sharing

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7532
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-7533 Use after free in Sharing
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.98 127.0.6533.99/.100 8/8/2024

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7532
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7532 None

CVE-2024-7534 - Chromium: CVE-2024-7535 Inappropriate implementation in V8

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7534
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-7535 Inappropriate implementation in V8
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.98 127.0.6533.99/.100 8/8/2024

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7534
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7534 None

CVE-2024-7533 - Chromium: CVE-2024-7534 Heap buffer overflow in Layout

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-7533
MITRE
NVD

Issuing CNA: Chrome

CVE Title: Chromium: CVE-2024-7534 Heap buffer overflow in Layout
CVSS:
None
Executive Summary:

This CVE was assigned by Chrome. Microsoft Edge (Chromium-based) ingests Chromium, which addresses this vulnerability. Please see Google Chrome Releases for more information.


FAQ:

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.98 127.0.6533.99/.100 8/8/2024

Why is this Chrome CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Chromium Open Source Software (OSS) which is consumed by Microsoft Edge (Chromium-based). It is being documented in the Security Update Guide to announce that the latest version of Microsoft Edge (Chromium-based) is no longer vulnerable.

How can I see the version of the browser?

  1. In your Microsoft Edge browser, click on the 3 dots (...) on the very right-hand side of the window
  2. Click on Help and Feedback
  3. Click on About Microsoft Edge

Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-7533
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
127.0.2651.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-7533 None

CVE-2024-21302 - Windows Secure Kernel Mode Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-21302
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelUnavailable
Report ConfidenceConfirmed

Executive Summary:

Summary:

Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.

Microsoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.

This CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.

Update: August 13, 2024

Microsoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are strongly encouraged to implement this opt-in mitigation, which is summarized in KB5042562: Guidance for blocking rollback of virtualization-based security related updates.

Caution: There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.

Details:

A security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.

The vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.

Microsoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. For more information see Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now – Microsoft Security Response Center

Microsoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.

Microsoft has released an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update.

Caution: There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.The following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.

Detections:

A detection has been added to Microsoft Defender for Endpoint (MDE) to alert customers using this product of an exploit attempt. Instructions for how Azure customers can integrate and enable MDE with Defender for Cloud are found here:

Note: False positives may be triggered by legitimate operations due to detection logic. Customers should investigate any alert for this detection to validate the root cause.


FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-24    

Information published.


1.1    08-Aug-24    

Added the Details, Recommended Actions, and Detections sections in the CVE Executive Summary because these were omitted when the CVE was initially published.


2.0    13-Aug-24    

Microsoft has released the August 2024 security updates that include an opt-in mitigation available as an interim solution to help protect customers concerned about this vulnerability until the final mitigation is available in a security update. For more information, please see KB5042562: Guidance for blocking rollback of virtualization-based security related updates.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-21302
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5040448 (Security Update) Important Elevation of Privilege 5039225
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.10240.20710
Yes 5040448
Windows 10 for x64-based Systems 5040448 (Security Update) Important Elevation of Privilege 5039225
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.10240.20710
Yes 5040448
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 6.7
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-21302

Alon Leviev with SafeBreach


CVE-2023-40547 - Redhat: CVE-2023-40547 Shim - RCE in HTTP boot support may lead to secure boot bypass

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-40547
MITRE
NVD

Issuing CNA: Red Hat, Inc.

CVE Title: Redhat: CVE-2023-40547 Shim - RCE in HTTP boot support may lead to secure boot bypass
CVSS:

CVSS:3.1 Highest BaseScore:8.3/TemporalScore:8.3
Base score metrics
Attack VectorAdjacent
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:

Why is this Red Hat, Inc. CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Linux Shim boot. It is being documented in the Security Update Guide to announce that the latest builds of Microsoft Windows address this vulnerability by blocking old, unpatched, Linux boot loaders by applying SBAT (Secure Boot Advanced Targeting) EFI variables in the UEFI library. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.

For more information see: CVE-2023-40547.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Will this update affect my ability to boot Linux after applying this update?

To address this security issue, Windows will apply a Secure Boot Advanced Targeting (SBAT) update to block vulnerable Linux boot loaders that could have an impact on Windows security. The SBAT value is not applied to dual-boot systems that boot both Windows and Linux and should not affect these systems. You might find that older Linux distribution ISOs will not boot. If this occurs, work with your Linux vendor to get an update.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Critical Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-40547
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Critical Security Feature Bypass 5040448 Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Critical Security Feature Bypass 5040448 Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Critical Security Feature Bypass 5040434
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Critical Security Feature Bypass 5040434
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Critical Security Feature Bypass 5040430
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Critical Security Feature Bypass 5040430
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Critical Security Feature Bypass 5040430
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Critical Security Feature Bypass 5040427
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Critical Security Feature Bypass 5040427
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Critical Security Feature Bypass 5040427
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Critical Security Feature Bypass
5040427
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Critical Security Feature Bypass
5040427
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Critical Security Feature Bypass
5040427
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Critical Security Feature Bypass 5040431
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Critical Security Feature Bypass 5040431
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Critical Security Feature Bypass 5040442 Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Critical Security Feature Bypass 5040442 Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Critical Security Feature Bypass 5040442 Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Critical Security Feature Bypass 5040442 Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Critical Security Feature Bypass 5040435
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Critical Security Feature Bypass 5040435
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.26100.1457
Yes 5041571
Windows Server 2012 5041851 (Monthly Rollup) Critical Security Feature Bypass 5040485
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Critical Security Feature Bypass 5040485
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Critical Security Feature Bypass 5040456
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Critical Security Feature Bypass 5040456
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Critical Security Feature Bypass 5040434
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Critical Security Feature Bypass 5040434
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Critical Security Feature Bypass 5040430
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Critical Security Feature Bypass 5040430
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Critical Security Feature Bypass 5040437
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Critical Security Feature Bypass 5040437
Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Critical Security Feature Bypass 5040438 Base: 8.3
Temporal: 8.3
Vector: CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-40547 Bill Demirkapi with Microsoft


CVE-2024-38084 - Microsoft OfficePlus Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38084
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft OfficePlus Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38084
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft OfficePLUS Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
3.2.0.27546 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38084 Crispr Xiang(@Crispr) with FDU


CVE-2024-38063 - Windows TCP/IP Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38063
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows TCP/IP Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An unauthenticated attacker could repeatedly send IPv6 packets, that include specially crafted packets, to a Windows machine which could enable remote code execution.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

  • Systems are not affected if IPv6 is disabled on the target machine.

Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38063
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Critical Remote Code Execution 5040448 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Critical Remote Code Execution 5040448 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Critical Remote Code Execution 5040431
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Critical Remote Code Execution 5040431
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Critical Remote Code Execution 5040435
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Critical Remote Code Execution 5040435
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Critical Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Critical Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Critical Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Critical Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Critical Remote Code Execution 5040497
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Critical Remote Code Execution 5040497
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Critical Remote Code Execution 5040485
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Critical Remote Code Execution 5040485
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Critical Remote Code Execution 5040456
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Critical Remote Code Execution 5040456
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Critical Remote Code Execution 5040437
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Critical Remote Code Execution 5040437
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Critical Remote Code Execution 5040438 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38063 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-38098 - Azure Connected Machine Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38098
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Unlikely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38098
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Connected Machine Agent Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.44 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38098 Filip Dragović


BochengXiang(@Crispr) with FDU


@sim0nsecurity


CVE-2024-38106 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38106
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38106
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.0
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38106 Anonymous


CVE-2024-38107 - Windows Power Dependency Coordinator Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38107
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38107
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 7.2
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38107 Anonymous


CVE-2024-29995 - Windows Kerberos Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-29995
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kerberos Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.1/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-29995
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 8.1
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160

Acknowledgements

CVE ID Acknowledgements
CVE-2024-29995 Eyal Ronen (Tel Aviv University) with Michal Shagam (Tel Aviv University)


CVE-2024-38114 - Windows IP Routing Management Snapin Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38114
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38114
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38114 QingHe Xie


FangMing Gu


Anonymous


CVE-2024-38115 - Windows IP Routing Management Snapin Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38115
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38115
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38115 Anonymous


QingHe Xie


FangMing Gu


CVE-2024-38116 - Windows IP Routing Management Snapin Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38116
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Any authenticated attacker could trigger this vulnerability. It does not require admin or other elevated privileges.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38116
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38116 QingHe Xie


FangMing Gu


Anonymous


CVE-2024-38117 - NTFS Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38117
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: NTFS Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, privileges required is Low (PR:L). What does that mean for this vulnerability?

To exploit this vulnerability an attacker must have an account with the User role assigned.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38117
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38117 hazard


CVE-2024-38118 - Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38118
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of stack memory.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38118
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Information Disclosure 5040448 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Information Disclosure 5040448 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Information Disclosure 5040431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Information Disclosure 5040431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Information Disclosure 5040497
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Information Disclosure 5040497
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Information Disclosure 5040485
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Information Disclosure 5040485
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Information Disclosure 5040456
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Information Disclosure 5040456
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Information Disclosure 5040437
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Information Disclosure 5040437
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Information Disclosure 5040438 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38118 Anonymous


CVE-2024-38121 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38121
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38121
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38121 Anonymous


CVE-2024-38122 - Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38122
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could potentially read small portions of stack memory.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38122
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Information Disclosure 5040448 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Information Disclosure 5040448 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Information Disclosure 5040431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Information Disclosure 5040431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Information Disclosure 5040497
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Information Disclosure 5040497
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Information Disclosure 5040485
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Information Disclosure 5040485
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Information Disclosure 5040456
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Information Disclosure 5040456
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Information Disclosure 5040437
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Information Disclosure 5040437
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Information Disclosure 5040438 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38122 Anonymous


CVE-2024-38125 - Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38125
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38125
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38125 Angelboy (@scwuaptx) with DEVCORE


CVE-2024-38126 - Windows Network Address Translation (NAT) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38126
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38126
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Denial of Service 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Denial of Service 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Denial of Service 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Denial of Service 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Denial of Service 5040438 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38126 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-38127 - Windows Hyper-V Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38127
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Hyper-V Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38127
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38127 Thunder_J


CVE-2024-38128 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38128
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38128
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38128 Anonymous


CVE-2024-38130 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38130
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38130
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38130 Anonymous


CVE-2024-38131 - Clipboard Virtual Channel Extension Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38131
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires a client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38131
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Remote Desktop client for Windows Desktop Release Notes (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.2.5560.0 Maybe None
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38131 YingQi Shi (@Mas0n)


CVE-2024-38132 - Windows Network Address Translation (NAT) Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38132
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38132
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Denial of Service 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Denial of Service 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Denial of Service 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Denial of Service 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Denial of Service 5040438 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38132 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-38133 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38133
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38133
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38133 Thijs Alkemade with Computest Sector 7


Khaled Nassar with Computest Sector 7


Daan Keuper with Computest Sector 7


CVE-2024-38134 - Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38134
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38134
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38134 Angelboy (@scwuaptx) with DEVCORE


CVE-2024-38135 - Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38135
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38135
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38135 Dan Reynolds and Sam Pope with MSRC Vulnerabilities & Mitigations


CVE-2024-38136 - Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38136
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38136
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38136 luckyu with NorthSea


CVE-2024-38137 - Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38137
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38137
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38137 luckyu with NorthSea


CVE-2024-38138 - Windows Deployment Services Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38138
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Deployment Services Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

For an attacker to exploit this vulnerability, they would need to have knowledge of a specific operation that triggers a memory allocation failure, specifically a use after free.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires the attacker to be an authenticated Windows Deployment Services user and to request a certain operation via an RPC call.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38138
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38138 VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-38140 - Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38140
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:8.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An unauthenticated attacker could exploit the vulnerability by sending specially crafted packets to a Windows Pragmatic General Multicast (PGM) open socket on the server, without any interaction from the user.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:

The following mitigating factors might be helpful in your situation:

This vulnerability is only exploitable only if there is a program listening on a Pragmatic General Multicast (PGM) port. If PGM is installed or enabled but no programs are actively listening as a receiver, then this vulnerability is not exploitable.

PGM does not authenticate requests so it is recommended to protect access to any open ports at the network level (e.g. with a firewall). It is not recommended to expose a PGM receiver to the public internet.


Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38140
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Critical Remote Code Execution 5040448 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Critical Remote Code Execution 5040448 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Critical Remote Code Execution 5040431
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Critical Remote Code Execution 5040431
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Critical Remote Code Execution 5040435
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Critical Remote Code Execution 5040435
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Critical Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Critical Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Critical Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Critical Remote Code Execution 5040499
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Critical Remote Code Execution 5040497
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Critical Remote Code Execution 5040497
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Critical Remote Code Execution 5040485
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Critical Remote Code Execution 5040485
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Critical Remote Code Execution 5040456
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Critical Remote Code Execution 5040456
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Critical Remote Code Execution 5040437
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Critical Remote Code Execution 5040437
Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Critical Remote Code Execution 5040438 Base: 9.8
Temporal: 8.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38140 Kyle Westhaus with Microsoft Offensive Research & Security Engineering (MORSE)


CVE-2024-38141 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38141
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38141
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38141

CVE-2024-38142 - Windows Secure Kernel Mode Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38142
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38142
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38142 Microsoft Offensive Research & Security Engineering (MORSE)


CVE-2024-38143 - Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38143
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:4.2/TemporalScore:3.7
Base score metrics
Attack VectorPhysical
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An unauthenticated attacker could exploit the vulnerability by interacting with a malicious wireless network from the lock screen of a device. Successful exploitation of this vulnerability does not crash systems or allow unauthorized access. However, it can potentially leak sensitive information.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38143
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 4.2
Temporal: 3.7
Vector: CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38143 John Jackson


CVE-2024-38144 - Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38144
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38144
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38144 Angelboy (@scwuaptx) with DEVCORE


Anonymous with SSD Secure Disclosure


anonymous with MatrixCup


CVE-2024-38145 - Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38145
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38145
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Denial of Service 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Denial of Service 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2012 5041851 (Monthly Rollup) Important Denial of Service 5040485
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Denial of Service 5040485
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Denial of Service 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Denial of Service 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Denial of Service 5040438 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38145 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-38146 - Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38146
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38146
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Denial of Service 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Denial of Service 5040448 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Denial of Service 5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Denial of Service
5040427
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2012 5041851 (Monthly Rollup) Important Denial of Service 5040485
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Denial of Service 5040485
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Denial of Service 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Denial of Service 5040456
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Denial of Service 5040434
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Denial of Service 5040430
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Denial of Service 5040438 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38146 Wei in Kunlun Lab with Cyber KunLun


CVE-2024-38147 - Microsoft DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38147
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.

Additionally, an attacker could convince a local user to open a malicious file. The attacker would have to convince the user to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38147
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38147 Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute


CVE-2024-38148 - Windows Secure Channel Denial of Service Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38148
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Secure Channel Denial of Service Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Denial of Service

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38148
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Denial of Service 5040431
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Denial of Service 5040442 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Denial of Service 5040435
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2022 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Denial of Service 5040437
Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Denial of Service 5040438 Base: 7.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38148 Anonymous


CVE-2024-38150 - Windows DWM Core Library Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38150
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DWM Core Library Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38150
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38150 Zhang WangJunJie, He YiSheng with Hillstone Network Security Research Institute


CVE-2024-38151 - Windows Kernel Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38151
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is a small amount of kernel memory which could be leaked back to the attacker.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38151
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Information Disclosure 5040448 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Information Disclosure 5040448 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Information Disclosure 5040431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Information Disclosure 5040431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Information Disclosure 5040497
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Information Disclosure 5040497
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Information Disclosure 5040485
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Information Disclosure 5040485
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Information Disclosure 5040456
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Information Disclosure 5040456
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Information Disclosure 5040434
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Information Disclosure 5040437
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Information Disclosure 5040437
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Information Disclosure 5040438 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38151 Naceri with MSRC Vulnerabilities & Mitigations


CVE-2024-38152 - Windows OLE Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38152
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows OLE Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38152
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Remote Code Execution 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Remote Code Execution
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Remote Code Execution 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Remote Code Execution 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Remote Code Execution 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38152 Anonymous


CVE-2024-38153 - Windows Kernel Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38153
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38153
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Elevation of Privilege 5040499
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Elevation of Privilege 5040497
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Elevation of Privilege 5040485
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38153 Microsoft Offensive Research & Security Engineering (MORSE)


CVE-2024-38154 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38154
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38154
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38154 Anonymous


CVE-2024-38155 - Security Center Broker Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38155
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Security Center Broker Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:4.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What type of information could be disclosed by this vulnerability?

An attacker who successfully exploited this vulnerability could view heap memory from a privileged process running on the server.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38155
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Information Disclosure 5040430
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Information Disclosure 5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Information Disclosure
5040427
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Information Disclosure 5040431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Information Disclosure 5040431
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Information Disclosure 5040442 Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Information Disclosure 5040435
Base: 5.5
Temporal: 4.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38155 nevul37 with CW Research Inc.


CVE-2024-38157 - Azure IoT SDK Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38157
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure IoT SDK Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must have permissions to access the target domain environment to be able to exploit this vulnerability.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38157
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure IoT Hub Device Client SDK Release Notes (Security Update) Important Remote Code Execution None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.12.1 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38157 VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-38158 - Azure IoT SDK Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38158
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure IoT SDK Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:6.1
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must have permissions to access the target domain environment to be able to exploit this vulnerability.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

The attacker must inject themselves into the logical network path between the target and the resource requested by the victim to read or modify network communications. This is called a machine-in-the-middle (MITM) attack.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
C SDK for Azure IoT Release Notes (Security Update) Important Remote Code Execution None Base: 7.0
Temporal: 6.1
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.12.1 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38158 VictorV(Tang tianwen) with Kunlun Lab


CVE-2024-38162 - Azure Connected Machine Agent Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38162
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited the vulnerability?

An attacker who successfully exploited this vulnerability could create or delete files in the security context of the NT AUTHORITY\ SYSTEM account.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38162
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Connected Machine Agent Release Notes (Security Update) Important Elevation of Privilege None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.44 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38162 Filip Dragović


CVE-2024-38165 - Windows Compressed Folder Tampering Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38165
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Compressed Folder Tampering Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Exploitation of the vulnerability requires that a user open a specially crafted file.

  • In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability.

An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.


Important Tampering

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 11 Version 22H2 for ARM64-based Systems 5040442 (Security Update) Important Tampering 5039212
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 22H2 for x64-based Systems 5040442 (Security Update) Important Tampering 5039212
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 23H2 for ARM64-based Systems 5040442 (Security Update) Important Tampering
5039212
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows 11 Version 23H2 for x64-based Systems 5040442 (Security Update) Important Tampering
5039212
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38165 Terrynini with DEVCORE


CVE-2024-38169 - Microsoft Office Visio Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38169
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Visio Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38169
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38169 Anonymous with Trend Micro Zero day Initiative


CVE-2024-38170 - Microsoft Excel Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38170
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Excel Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:6.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38170
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 7.1
Temporal: 6.2
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C
16.88.24081116 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38170 Anonymous


CVE-2024-38171 - Microsoft PowerPoint Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38171
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft PowerPoint Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally.

For example, when the score indicates that the Attack Vector is Local and User Interaction is Required, this could describe an exploit in which an attacker, through social engineering, convinces a victim to download and open a specially crafted file from a website which leads to a local attack on their computer.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38171
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC for Mac 2021 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.88.24081116 Maybe None
Microsoft PowerPoint 2016 (32-bit edition) 5002586 (Security Update) Important Remote Code Execution 5002495 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5461.1000 Maybe None
Microsoft PowerPoint 2016 (64-bit edition) 5002586 (Security Update) Important Remote Code Execution 5002495 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5461.1000 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38171 Anonymous working with Trend Micro Zero Day Initiative


CVE-2024-38173 - Microsoft Outlook Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38173
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Outlook Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.7/TemporalScore:5.8
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


According to the CVSS metric, the attack complexity is high (AC:H) and privileges required are low (PR:L). What does that mean for this vulnerability?

An attacker must gain access to the victim user's Microsoft Outlook account by compromising or stealing their login credential and then install a malicious form prior to exploiting the vulnerability successfully.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

Successful exploitation of this vulnerability requires a user to open a malicious email with an affected version of Microsoft Outlook and then perform specific actions to trigger the vulnerability.


Is the Preview Pane an attack vector for this vulnerability?

Yes, the Preview Pane is an attack vector.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38173
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Outlook 2016 (32-bit edition) 5002626 (Security Update) Important Remote Code Execution 5002621 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5461.1001 Maybe None
Microsoft Outlook 2016 (64-bit edition) 5002626 (Security Update) Important Remote Code Execution 5002621 Base: 6.7
Temporal: 5.8
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
16.0.5461.1001 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38173 Michael Gorelik with Morphisec


Michael Gorelik with Morphisec


Shmuel Uzan with Morphisec


CVE-2024-38177 - Windows App Installer Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38177
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows App Installer Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The attacker must convince a user to call Windows App Installer with a specially crafted malicious winget file.


How can I find more information regarding Windows App Installer and Winget?

Please read this page to understand more about App Installer: [Installing the App Installer(https://learn.microsoft.com/en-us/windows/msix/app-installer/install-update-app-installer).


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38177
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
App Installer Release Notes (Security Update) Important Spoofing None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
1.22.11261.0 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38177 Felix Boulet


CVE-2024-38180 - Windows SmartScreen Security Feature Bypass Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38180
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows SmartScreen Security Feature Bypass Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

A user needs to be tricked into running malicious files.


How could an attacker exploit this vulnerability?

To exploit this security feature bypass vulnerability, an attacker would need to convince a user to launch malicious files using a launcher application that requests that no UI be shown.


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Security Feature Bypass

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38180
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Security Feature Bypass 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Security Feature Bypass 5040448 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Security Feature Bypass 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Security Feature Bypass 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Security Feature Bypass 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Security Feature Bypass 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Security Feature Bypass 5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Security Feature Bypass
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Security Feature Bypass
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Security Feature Bypass
5040427
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Security Feature Bypass 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Security Feature Bypass 5040431
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Security Feature Bypass 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Security Feature Bypass 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Security Feature Bypass 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Security Feature Bypass 5040442 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Security Feature Bypass 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Security Feature Bypass 5040435
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Security Feature Bypass 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Security Feature Bypass 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Security Feature Bypass 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Security Feature Bypass 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Security Feature Bypass 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Security Feature Bypass 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Security Feature Bypass 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Security Feature Bypass 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Security Feature Bypass 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Security Feature Bypass 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Security Feature Bypass 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Security Feature Bypass 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Security Feature Bypass 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Security Feature Bypass 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Security Feature Bypass 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Security Feature Bypass 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38180 Harry Withington with Aura Information Security


CVE-2024-38185 - Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38185
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38185
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1607 for x64-based Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1809 for 32-bit Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for ARM64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for x64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 21H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 22H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 11 version 21H2 for ARM64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 version 21H2 for x64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 Version 22H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 22H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 23H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows 11 Version 23H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows Server 2016 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2016 (Server Core installation) 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2019 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2019 (Server Core installation) 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2022 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022 (Server Core installation) 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022, 23H2 Edition (Server Core installation) 5040438 (Security Update) Important Elevation of Privilege 5039236
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1009
Yes 5040438

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38185 Philippe Laulheret with Cisco Talos


CVE-2024-38186 - Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38186
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38186
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1607 for x64-based Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1809 for 32-bit Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for ARM64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for x64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 21H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 22H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 11 version 21H2 for ARM64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 version 21H2 for x64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 Version 22H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 22H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 23H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows 11 Version 23H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows Server 2016 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2016 (Server Core installation) 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2019 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2019 (Server Core installation) 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2022 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022 (Server Core installation) 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022, 23H2 Edition (Server Core installation) 5040438 (Security Update) Important Elevation of Privilege 5039236
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1009
Yes 5040438

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38186 Philippe Laulheret with Cisco Talos


CVE-2024-38187 - Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38187
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published. This CVE was addressed by updates that were released in July 2024, but the CVE was inadvertently omitted from the July 2024 Security Updates. This is an informational change only. Customers who have already installed the July 2024 updates do not need to take any further action.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38187
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1607 for x64-based Systems 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows 10 Version 1809 for 32-bit Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for ARM64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 1809 for x64-based Systems 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows 10 Version 21H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 21H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege 5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4651
Yes 5040427
Windows 10 Version 22H2 for 32-bit Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for ARM64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 10 Version 22H2 for x64-based Systems 5040427 (Security Update) Important Elevation of Privilege
5039211
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4651
Yes 5040427
Windows 11 version 21H2 for ARM64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 version 21H2 for x64-based Systems 5040431 (Security Update) Important Elevation of Privilege 5039213
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3079
Yes 5040431
Windows 11 Version 22H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 22H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege 5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.3880
Yes 5040442
Windows 11 Version 23H2 for ARM64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows 11 Version 23H2 for x64-based Systems 5040442 (Security Update) Important Elevation of Privilege
5039212
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.22631.3880
Yes 5040442
Windows Server 2016 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2016 (Server Core installation) 5040434 (Security Update) Important Elevation of Privilege 5039214
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7159
Yes 5040434
Windows Server 2019 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2019 (Server Core installation) 5040430 (Security Update) Important Elevation of Privilege 5039217
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6054
Yes 5040430
Windows Server 2022 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022 (Server Core installation) 5040437 (Security Update) Important Elevation of Privilege 5039227
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2582
Yes 5040437
Windows Server 2022, 23H2 Edition (Server Core installation) 5040438 (Security Update) Important Elevation of Privilege 5039236
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1009
Yes 5040438

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38187 Philippe Laulheret with Cisco Talos


CVE-2024-38189 - Microsoft Project Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38189
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Project Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.2
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityFunctional
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

Exploitation requires the victim to open a malicious Microsoft Office Project file on a system where the Block macros from running in Office files from the Internet policy is disabled and VBA Macro Notification Settings are not enabled allowing the attacker to perform remote code execution.

  • In an email attack scenario, an attacker could send the malicious file to the victim and convince them to open the file.
  • In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a malicious file designed to exploit the vulnerability.

An attacker would have no way to force the victim to visit the website. Instead, an attacker would have to convince the victim to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the malicious file.


Is the Preview Pane an attack vector for this vulnerability?

No, the Preview Pane is not an attack vector.


Mitigations:

The following mitigating factors might be helpful in your situation:

Microsoft strongly recommends customers do not disable the Block macros from running in Office files from the Internet policy which protects against this vulnerability. However, customers who have disabled this policy can alternatively enable VBA Macro Notification Settings to protect their systems from this vulnerability being exploited.


Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Detected No Yes

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38189
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Remote Code Execution None Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Project 2016 (32-bit edition) 5002561 (Security Update) Important Remote Code Execution 5002328 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
16.0.5461.1001 Maybe None
Microsoft Project 2016 (64-bit edition) 5002561 (Security Update) Important Remote Code Execution 5002328 Base: 8.8
Temporal: 8.2
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
16.0.5461.1001 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38189

CVE-2024-38195 - Azure CycleCloud Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38195
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure CycleCloud Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How could an attacker exploit this vulnerability?

An authenticated attacker with permissions to execute commands on the Azure CycleCloud instance could send a specially crafted request that returns the storage account credentials and runtime data. The attacker can then use the comprised credentials to access the underlying storage resources and upload malicious scripts which will be executed as Root, enabling remote code execution to be performed on any cluster in the CycleCloud instance.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38195
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure CycleCloud 8.0.0 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.0.1 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.0.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.1.0 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.1.1 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.2.0 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.2.1 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.2.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.3.0 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.4.0 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.4.1 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.4.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.5.0 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.6.0 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.6.1 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None
Azure CycleCloud 8.6.2 Release Notes (Security Update) Important Remote Code Execution None Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
8.6.3 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38195 Anonymous


CVE-2024-38163 - Windows Update Stack Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38163
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

How do I protect myself from this vulnerability?

The vulnerability pertains to a previous installer version which has been superseded by the new WinRE installer. Since the vulnerability is only exploitable at the install time, users need to take no action to be protected from this vulnerability. See the linked Article in the Security Updates table about the update for your particular Windows version.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


How do I know if I need to install the update to be protected from this vulnerability?

You do not need to install the standalone updates listed in the Security Updates table if either of the following applies:

  1. You have installed the January 9, 2024 or newer SafeOS Dynamic Update for your operating system, available on the Microsoft Update Catalog.
  2. If the WinRE image on your machine has a version greater than or equal to the following, based on the installed operating system. To determine the version of your WinRE image, check the WinREVersion registry value at HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion:
  • Windows 11, version 21H2: WinRE Version must be >= 10.0.22000.2710
  • Windows Server 2022: WinRE Version must be >= 10.0.20348.2201
  • Windows 10, version 21H2 and Windows 10, version 22H2: WinRE Version must be >= 10.0.19041.3920

Note that the update will not be offered if your machine does not have enough free space on your WinRE Recovery Partition, or if you do not have WinRE enabled.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation More Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38163
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 21H2 for 32-bit Systems 5042320 (Security Update) Important Elevation of Privilege 5034441 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Not applicable Maybe None
Windows 10 Version 21H2 for x64-based Systems 5042320 (Security Update) Important Elevation of Privilege 5034441 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Not applicable Maybe None
Windows 10 Version 22H2 for 32-bit Systems 5042320 (Security Update) Important Elevation of Privilege 5034441 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Not applicable Maybe None
Windows 10 Version 22H2 for x64-based Systems 5042320 (Security Update) Important Elevation of Privilege 5034441 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Not applicable Maybe None
Windows 11 version 21H2 for x64-based Systems 5042321 (Security Update) Important Elevation of Privilege 5034440 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Not Applicable Maybe None
Windows Server 2022 5042322 (Security Update) Important Elevation of Privilege 5034439 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Not applicable Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38163 Ilan Kotler


Sandro Poppi


Nicholas Zubrisky (@NZubrisky) of Trend Micro Zero Day Initiative


CVE-2024-38200 - Microsoft Office Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38200
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Office Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file.


Am I vulnerable to this issue until I install the August 13, 2024 updates?

No, we identified an alternative fix to this issue that we enabled via Feature Flighting on 7/30/2024. Customers are already protected on all in-support versions of Microsoft Office and Microsoft 365. Customers should still update to the August 13, 2024 updates for the final version of the fix.

When will a final update be available to address this vulnerability?

The Security Updates table will be revised when the update is publicly available. If you wish to be notified when these update is released, we recommend that you register for the security notifications mailer to be alerted of content changes to this CVE. See Microsoft Technical Security Notifications and Coming Soon: New Security Update Guide Notification System.


There are multiple update packages available for some of the affected software. Do I need to install all the updates listed in the Security Updates table for the software?

Yes. Customers should apply all updates offered for the software installed on their systems. If multiple updates apply, they can be installed in any order.


Mitigations:

The following mitigating factors may be helpful in your situation:

Configuring the Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers policy setting provides the ability to allow, block, or audit outgoing NTLM traffic from a computer running Windows Server 2008, Windows Server 2008 R2, or later to any remote server running the Windows operating system. Performing this mitigation allows you to block or audit all attempts to connect to remote servers through NTLM authentication. Please note: Modifying this policy setting may affect compatibility with client computers, services, and applications.


The following mitigating factors may be helpful in your situation:

  • Add users to the Protected Users Security Group, which prevents the use of NTLM as an authentication mechanism. Performing this mitigation makes troubleshooting easier than other methods of disabling NTLM. Consider using it for high value accounts such as Domain Admins when possible. Please note: This may cause impact to applications that require NTLM, however the settings will revert once the user is removed from the Protected Users Group. Please see Protected Users Security Group for more information.
  • Block TCP 445/SMB outbound from your network by using a perimeter firewall, a local firewall, and via your VPN settings. This will prevent the sending of NTLM authentication messages to remote file shares.

Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


1.1    09-Aug-24    

Added FAQ information. This is an informational change only.


1.2    10-Aug-24    

Updated the Publicly Disclosed information.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38200
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft 365 Apps for Enterprise for 32-bit Systems Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft 365 Apps for Enterprise for 64-bit Systems Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2016 (32-bit edition) 5002625 (Security Update)
5002570 (Security Update)
Important Spoofing 5002620
5002519
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5461.1001
16.0.5461.1000
Maybe None
Microsoft Office 2016 (64-bit edition) 5002625 (Security Update)
5002570 (Security Update)
Important Spoofing 5002620
5002519
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
16.0.5461.1001
16.0.5461.1000
Maybe None
Microsoft Office 2019 for 32-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office 2019 for 64-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 32-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None
Microsoft Office LTSC 2021 for 64-bit editions Click to Run (Security Update) Important Spoofing None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
https://aka.ms/OfficeSecurityReleases No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38200 Metin Yunus Kandemir


JimSRush with PrivSec Consulting


CVE-2022-3775 - Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-3775
MITRE
NVD

Issuing CNA: Red Hat, Inc.

CVE Title: Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences
CVSS:

CVSS:3.1 Highest BaseScore:7.1/TemporalScore:7.1
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:

Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


Why is this Redhat CVE included in the Security Update Guide?

The vulnerability assigned to this CVE is in Linux shim rhboot/shim, a bootloader designed to support Secure Boot on systems that are running Linux. It is being documented in the Security Update Guide to announce that the latest builds of Windows are no longer vulnerable to this security feature bypass using Linux shim. Please see Security Update Guide Supports CVEs Assigned by Industry Partners for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Critical Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-3775
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM grub2 (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
2.06-14 Unknown None
Azure Linux 3.0 x64 grub2 (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
2.06-14 Unknown None
CBL Mariner 1.0 ARM grub2 (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
2.06~rc1-10 Unknown None
CBL Mariner 1.0 x64 grub2 (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
2.06~rc1-10 Unknown None
CBL Mariner 2.0 ARM grub2 (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
2.06-10 Unknown None
CBL Mariner 2.0 x64 grub2 (CBL-Mariner) Unknown Unknown None Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
2.06-10 Unknown None
Windows 10 for 32-bit Systems 5041782 (Security Update) Critical Remote Code Execution 5040448 Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Critical Remote Code Execution 5040448 Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Critical Remote Code Execution 5040427
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Critical Remote Code Execution
5040427
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Critical Remote Code Execution 5040431
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Critical Remote Code Execution 5040431
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Critical Remote Code Execution 5040442 Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Critical Remote Code Execution 5040435
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Critical Remote Code Execution 5040435
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.26100.1457
Yes 5041571
Windows Server 2012 5041851 (Monthly Rollup) Critical Remote Code Execution 5040485
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Critical Remote Code Execution 5040485
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Critical Remote Code Execution 5040456
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Critical Remote Code Execution 5040456
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Critical Remote Code Execution 5040434
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Critical Remote Code Execution 5040430
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Critical Remote Code Execution 5040437
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Critical Remote Code Execution 5040437
Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Critical Remote Code Execution 5040438 Base: 7.1
Temporal: 7.1
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-3775 Bill Demirkapi with Microsoft


CVE-2024-38211 - Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38211
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, successful exploitation of this vulnerability could lead to some loss of integrity (I:L)? What does that mean for this vulnerability?

The attacker is only able to modify the content of the vulnerable link to redirect the victim to a malicious site.


According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

The user would have to click on a specially crafted URL to be compromised by the attacker.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38211
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Dynamics 365 (on-premises) version 9.1 5041557 (Security Update) Important Spoofing None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
1.31 Maybe None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38211 Michael Boeynaems with Splynter


Felix Boulet with Centre gouvernemental de cyberdéfense (CGCD)


CVE-2024-38120 - Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38120
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:7.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an admin user on the client to connect to a malicious server, and that could allow the attacker to gain code execution on the client.


How could an attacker exploit this vulnerability?

An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38120
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Remote Code Execution 5040499
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Remote Code Execution 5040497
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Remote Code Execution 5040485
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Remote Code Execution 5040456
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Remote Code Execution 5040434
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Remote Code Execution 5040430
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Remote Code Execution 5040437
Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Remote Code Execution 5040438 Base: 8.8
Temporal: 7.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38120 Anonymous


CVE-2024-38214 - Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38214
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to major loss of confidentiality (C:H) but have no effect on integrity (I:N) or on availability (A:N). What does that mean for this vulnerability?

An attacker who successfully exploited the vulnerability could view sensitive information (Confidentiality). While the attacker can not make changes to disclosed information (Integrity) and limit access to the resource (Availability).


Windows 11, version 24H2 is not generally available yet. Why are there updates for this version of Windows listed in the Security Updates table?

The new Copilot+ devices that are now publicly available come with Windows 11, version 24H2 installed. Customers with these devices need to know about any vulnerabilities that affect their machine and to install the updates if they are not receiving automatic updates. Note that the general availability date for Windows 11, version 24H2 is scheduled for later this year.


According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

This attack requires a admin user on the client to connect to a malicious server and then take specific actions which could result in information disclosure.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38214
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Information Disclosure 5040499
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Information Disclosure 5040497
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Information Disclosure 5040497
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Information Disclosure 5040485
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Information Disclosure 5040485
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Information Disclosure 5040456
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Information Disclosure 5040456
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Information Disclosure 5040434
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Information Disclosure 5040434
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Information Disclosure 5040430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Information Disclosure 5040430
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Information Disclosure 5040437
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Information Disclosure 5040437
Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Information Disclosure 5040438 Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38214 Anonymous


CVE-2024-38215 - Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38215
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:6.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38215
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 7.8
Temporal: 6.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38215 Ezrakiez with MatrixCup


CVE-2024-38166 - Microsoft Dynamics 365 Cross-site Scripting Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38166
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Dynamics 365 Cross-site Scripting Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:7.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

An unauthenticated attacker can exploit improper neutralization of input during web page generation in Microsoft Dynamics 365 to spoof over a network by tricking a user to click on a link.


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. This purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-24    

Information published.


Critical Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38166
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Dynamics CRM Service Portal Web Resource Critical Spoofing None Base: 8.2
Temporal: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38166 Jhilakshi


CVE-2024-38206 - Microsoft Copilot Studio Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38206
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Copilot Studio Information Disclosure Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.5/TemporalScore:7.4
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityLow
AvailabilityNone
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

An authenticated attacker can bypass Server-Side Request Forgery (SSRF) protection in Microsoft Copilot Studio to leak sensitive information over a network.


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. This purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    06-Aug-24    

Information published.


Critical Information Disclosure

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38206
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Copilot Studio Critical Information Disclosure None Base: 8.5
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38206 Evan Grant with Tenable


CVE-2024-38202 - Windows Update Stack Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38202
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Update Stack Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.3/TemporalScore:6.9
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelUnavailable
Report ConfidenceConfirmed

Executive Summary:

Summary

Microsoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.

Microsoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.

This CVE will be updated, and customers will be notified when the official mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.

Details

A security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Update potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.

Microsoft is developing a security update that will mitigate this vulnerability, but it is not yet available. This CVE will be updated with new information and links to the security updates once available. We highly encourage customers subscribe to Security Update Guide notifications to be alerted of updates. See Microsoft Technical Security Notifications and Security Update Guide Notification System News: Create your profile now – Microsoft Security Response Center.

Microsoft is not aware of any attempts to exploit this vulnerability. However, a public presentation regarding this vulnerability was hosted at BlackHat on August 7, 2024. The presentation was appropriately coordinated with Microsoft but may change the threat landscape. Customers concerned with these risks should reference the guidance provided in the Recommended Actions section to protect their systems.

The following recommendations do not mitigate the vulnerability but can be used to reduce the risk of exploitation until the security update is available.


FAQ:

According to the CVSS metric, privileges required is low (PR:L). What does that mean for this vulnerability?

The attacker must have permissions to access the target's System directory to plant the malicious folder that would be used as part of the exploitation.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


According to the CVSS metric, user interaction is required (UI:R). What does that mean for this vulnerability? To successfully exploit this vulnerability, an attacker must convince or trick an administrative user into performing a system restore.


Mitigations:
None
Workarounds:
None
Revision:
1.0    07-Aug-24    

Information published.


1.1    08-Aug-24    

Added an additional recommended action option and edited the details of a separate recommended action in the CVE Executive Summary.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely Yes No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38202
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 Version 1607 for 32-bit Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1607 for x64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1809 for 32-bit Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1809 for ARM64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 1809 for x64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 21H2 for 32-bit Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 21H2 for ARM64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 21H2 for x64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 22H2 for 32-bit Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 22H2 for ARM64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 10 Version 22H2 for x64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 11 version 21H2 for ARM64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 11 version 21H2 for x64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 11 Version 22H2 for ARM64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 11 Version 22H2 for x64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 11 Version 23H2 for ARM64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows 11 Version 23H2 for x64-based Systems Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows Server 2016 Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows Server 2016 (Server Core installation) Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows Server 2019 Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows Server 2019 (Server Core installation) Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows Server 2022 Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows Server 2022 (Server Core installation) Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None
Windows Server 2022, 23H2 Edition (Server Core installation) Important Elevation of Privilege None Base: 7.3
Temporal: 6.9
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38202 Alon Leviev with SafeBreach


CVE-2024-38218 - Microsoft Edge (HTML-based) Memory Corruption Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38218
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (HTML-based) Memory Corruption Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:7.3
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.98 127.0.6533.99/.100 8/8/2024

According to the CVSS metric, the attack vector is local (AV:L). Why does the CVE title indicate that this is a remote code execution?

The word Remote in the title refers to the location of the attacker. This type of exploit is sometimes referred to as Arbitrary Code Execution (ACE). The attack itself is carried out locally. This means an attacker or victim needs to execute code from the local machine to exploit the vulnerability.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Important Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38218
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Important Remote Code Execution None Base: 8.4
Temporal: 7.3
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
127.0.2651.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38218 Nan Wang(@eternalsakura13)


CVE-2024-38219 - Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38219
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:5.7
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityLow
IntegrityLow
AvailabilityLow
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metrics, successful exploitation of this vulnerability could lead to minor loss of confidentiality (C:L), integrity (I:L) and availability (A:L). What does that mean for this vulnerability?

While we cannot rule out the impact to Confidentiality, Integrity, and Availability, the ability to exploit this vulnerability by itself is limited. An attacker would need to combine this with other vulnerabilities to perform an attack.


According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to gather information specific to the environment and take additional actions prior to exploitation to prepare the target environment.


What is the version information for this release?

Microsoft Edge Channel Microsoft Edge Version Based on Chromium Version Date Released
Stable 127.0.2651.98 127.0.6533.99/.100 8/8/2024

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to a contained execution environment escape. Please refer to AppContainer Isolation for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Moderate Remote Code Execution

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38219
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Microsoft Edge (Chromium-based) Release Notes (Security Update) Moderate Remote Code Execution None Base: 6.5
Temporal: 5.7
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L/E:U/RL:O/RC:C
127.0.2651.98 No None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38219 Nan Wang(@eternalsakura13)


CVE-2024-38222 - Microsoft Edge (Chromium-based) Information Disclosure Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38222
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
CVSS:
None
Executive Summary:
None
FAQ:

Why is the severity for this CVE rated as Moderate, but the CVSS score is higher than normal?

Per our severity guidelines, the amount of user interaction or preconditions required to allow this sort of exploitation downgraded the severity, specifically it says, "If a bug requires more than a click, a key press, or several preconditions, the severity will be downgraded". The CVSS scoring system doesn't allow for this type of nuance.


What type of information could be disclosed by this vulnerability?

The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Edge WebUI permission. The vulnerability allows an attacker to access a victim's data (for example, microphone and camera) through the victim's Edge WebUI default permission.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38222
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38222 Jun Kokatsu


CVE-2024-38223 - Windows Initial Machine Configuration Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38223
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows Initial Machine Configuration Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:6.8/TemporalScore:5.9
Base score metrics
Attack VectorPhysical
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:

According to the CVSS metric, the attack vector is physical (AV:P). What does that mean for this vulnerability?

To exploit this vulnerability, an attacker needs physical access to the victim's machine.


How could an attacker exploit this vulnerability?

An unauthenticated attacker can use a specially crafted IMC.hiv file (with the registry configuration that needs to be changed), which could lead to elevation of privilege.


What privileges could be gained by an attacker who successfully exploited this vulnerability?

An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38223
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows 10 for 32-bit Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 for x64-based Systems 5041782 (Security Update) Important Elevation of Privilege 5040448 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.10240.20751 Yes None
Windows 10 Version 1607 for 32-bit Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1607 for x64-based Systems 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows 10 Version 1809 for 32-bit Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for ARM64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 1809 for x64-based Systems 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows 10 Version 21H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 21H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege 5040427
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.19044.4780
Yes 5041580
Windows 10 Version 22H2 for 32-bit Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for ARM64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 10 Version 22H2 for x64-based Systems 5041580 (Security Update) Important Elevation of Privilege
5040427
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

10.0.19045.4780
Yes 5041580
Windows 11 version 21H2 for ARM64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 version 21H2 for x64-based Systems 5041592 (Security Update) Important Elevation of Privilege 5040431
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22000.3147
Yes 5041592
Windows 11 Version 22H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 22H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22621.4037 Yes None
Windows 11 Version 23H2 for ARM64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 23H2 for x64-based Systems 5041585 (Security Update) Important Elevation of Privilege 5040442 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.22631.4037 Yes None
Windows 11 Version 24H2 for ARM64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows 11 Version 24H2 for x64-based Systems 5041571 (Security Update) Important Elevation of Privilege 5040435
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.26100.1457
Yes 5041571
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Elevation of Privilege 5040456
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Elevation of Privilege 5040434
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Elevation of Privilege 5040430
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Elevation of Privilege 5040437
Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Elevation of Privilege 5040438 Base: 6.8
Temporal: 5.9
Vector: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38223 Anonymous


CVE-2024-38109 - Azure Health Bot Elevation of Privilege Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38109
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Azure Health Bot Elevation of Privilege Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:7.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics
Exploit Code MaturityUnproven
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:

An authenticated attacker can exploit an Server-Side Request Forgery (SSRF) vulnerability in Microsoft Azure Health Bot to elevate privileges over a network.


FAQ:

Why are there no links to an update or instructions with steps that must be taken to protect from this vulnerability?

This vulnerability has already been fully mitigated by Microsoft. There is no action for users of this service to take. This purpose of this CVE is to provide further transparency.

Please see Toward greater transparency: Unveiling Cloud Service CVEs for more information.


Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Critical Elevation of Privilege

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38109
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Health Bot Critical Elevation of Privilege None Base: 9.1
Temporal: 7.9
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38109 Jimi Sebree with Tenable


CVE-2024-37968 - Windows DNS Spoofing Vulnerability

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-37968
MITRE
NVD

Issuing CNA: Microsoft

CVE Title: Windows DNS Spoofing Vulnerability
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:6.7
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics
Exploit Code MaturityProof-of-Concept
Remediation LevelOfficial Fix
Report ConfidenceConfirmed

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    13-Aug-24    

Information published.


Important Spoofing

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Exploitation Less Likely No No

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-37968
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Windows Server 2008 for 32-bit Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Spoofing 5040499
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Spoofing 5040499
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Spoofing 5040499
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 5041850 (Monthly Rollup)
5041847 (Security Only)
Important Spoofing 5040499
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.0.6003.22825
Yes 5041850
5041847
Windows Server 2008 R2 for x64-based Systems Service Pack 1 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Spoofing 5040497
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 5041838 (Monthly Rollup)
5041823 (Security Only)
Important Spoofing 5040497
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.1.7601.27277 Yes None
Windows Server 2012 5041851 (Monthly Rollup) Important Spoofing 5040485
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 (Server Core installation) 5041851 (Monthly Rollup) Important Spoofing 5040485
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.2.9200.25031
Yes 5041851
Windows Server 2012 R2 5041828 (Monthly Rollup) Important Spoofing 5040456
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2012 R2 (Server Core installation) 5041828 (Monthly Rollup) Important Spoofing 5040456
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
6.3.9600.22134
Yes 5041828
Windows Server 2016 5041773 (Security Update) Important Spoofing 5040434
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2016 (Server Core installation) 5041773 (Security Update) Important Spoofing 5040434
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
10.0.14393.7259
Yes 5041773
Windows Server 2019 5041578 (Security Update) Important Spoofing 5040430
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2019 (Server Core installation) 5041578 (Security Update) Important Spoofing 5040430
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
10.0.17763.6189
Yes 5041578
Windows Server 2022 5041160 (Security Update) Important Spoofing 5040437
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022 (Server Core installation) 5041160 (Security Update) Important Spoofing 5040437
Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
10.0.20348.2655
Yes 5041160
Windows Server 2022, 23H2 Edition (Server Core installation) 5041573 (Security Update) Important Spoofing 5040438 Base: 7.5
Temporal: 6.7
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
10.0.25398.1085 Yes None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-37968 Yunyi Zhang with NUDT


CVE-2022-36648 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-36648
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:10.0/TemporalScore:10.0
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-36648
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 10.0
Temporal: 10.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 10.0
Temporal: 10.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 10.0
Temporal: 10.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
6.2.0-17 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 10.0
Temporal: 10.0
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
6.2.0-17 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-36648 None

CVE-2007-4559 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2007-4559
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    25-Sep-20    

Information published.


2.0    16-Dec-21    

Added python3 to CBL-Mariner 2.0


1.0    30-Jun-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2007-4559
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
2.7.18-5 Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
2.7.18-5 Unknown None
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-1 Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
3.9.19-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2007-4559 None

CVE-2019-9674 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-9674
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-20    

Information published.


1.0    30-Jun-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-9674
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5 Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5 Unknown None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-9674 None

CVE-2019-3833 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-3833
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Apr-24    

Information published.


1.0    30-Jun-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-3833
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM openwsman (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.8-13 Unknown None
CBL Mariner 2.0 x64 openwsman (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.6.8-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-3833 None

CVE-2024-6655 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6655
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.0/TemporalScore:7.0
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6655
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM gtk2 (CBL-Mariner)
gtk3 (CBL-Mariner)
Unknown Unknown Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2.24.32-12
3.24.28-10
None
CBL Mariner 2.0 x64 gtk2 (CBL-Mariner)
gtk3 (CBL-Mariner)
Unknown Unknown Base: 7.0
Temporal: 7.0
Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
2.24.32-12
3.24.28-10
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6655 None

CVE-2024-2466 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2466
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2466
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM curl (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
8.8.0-1 Unknown None
CBL Mariner 2.0 x64 curl (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
8.8.0-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2466 None

CVE-2024-39331 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39331
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39331
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM emacs (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
29.4-1 Unknown None
CBL Mariner 2.0 x64 emacs (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
29.4-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39331 None

CVE-2021-43565 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-43565
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    23-Jul-24    

Information published.


1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-43565
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM cf-cli (CBL-Mariner)
cri-o (CBL-Mariner)
gh (CBL-Mariner)
moby-buildx (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.4.0-18
1.22.3-5
2.13.0-19
0.7.1-20
None
CBL Mariner 2.0 x64 cf-cli (CBL-Mariner)
cri-o (CBL-Mariner)
gh (CBL-Mariner)
moby-buildx (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
8.4.0-18
1.22.3-5
2.13.0-19
0.7.1-20
None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-43565 None

CVE-2024-39277 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39277
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39277
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39277 None

CVE-2024-38780 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38780
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38780
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38780 None

CVE-2024-39292 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39292
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39292
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39292 None

CVE-2024-39482 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39482
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39482
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39482 None

CVE-2024-39484 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39484
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39484
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39484 None

CVE-2024-39495 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39495
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39495
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39495 None

CVE-2024-40902 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-40902
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-40902
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-40902 None

CVE-2024-41110 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-41110
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.9/TemporalScore:9.9
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-41110
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM moby-engine (CBL-Mariner) Unknown Unknown None Base: 9.9
Temporal: 9.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
24.0.9-7 Unknown None
CBL Mariner 2.0 x64 moby-engine (CBL-Mariner) Unknown Unknown None Base: 9.9
Temporal: 9.9
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
24.0.9-7 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-41110 None

CVE-2024-37298 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-37298
MITRE
NVD

Issuing CNA: security-advisories@github.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    19-Jul-24    

Information published.


1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-37298
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM libcontainers-common (CBL-Mariner)
telegraf (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
20210626-4
1.29.4-7
None
CBL Mariner 2.0 x64 libcontainers-common (CBL-Mariner)
telegraf (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
20210626-4
1.29.4-7
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-37298 None

CVE-2024-0397 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-0397
MITRE
NVD

Issuing CNA: cna@python.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.4/TemporalScore:7.4
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-0397
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM python3 (CBL-Mariner) Unknown Unknown None Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
3.9.19-3 Unknown None
CBL Mariner 2.0 x64 python3 (CBL-Mariner) Unknown Unknown None Base: 7.4
Temporal: 7.4
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H
3.9.19-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-0397 None

CVE-2021-3929 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-3929
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-3929
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.2.0-13 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.2.0-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-3929 None

CVE-2021-4158 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-4158
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.0/TemporalScore:6.0
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-4158
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 6.0
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 6.0
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 6.0
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.2.0-7 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 6.0
Temporal: 6.0
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H
6.2.0-7 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-4158 None

CVE-2021-4206 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-4206
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-4206
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 1.0 ARM qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
4.2.0-41 Unknown None
CBL Mariner 1.0 x64 qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
4.2.0-41 Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.2.0-4 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.2.0-4 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-4206 None

CVE-2021-4207 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-4207
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-4207
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 1.0 ARM qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
4.2.0-48 Unknown None
CBL Mariner 1.0 x64 qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
4.2.0-48 Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.2.0-13 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.2.0-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-4207 None

CVE-2022-26353 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-26353
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-26353
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.2.0-3 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.2.0-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-26353 None

CVE-2022-35414 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-35414
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-35414
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 1.0 ARM qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
4.2.0-43 Unknown None
CBL Mariner 1.0 x64 qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
4.2.0-43 Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.2.0-7 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
6.2.0-7 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-35414 None

CVE-2023-3354 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-3354
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-3354
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.2.0-19 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.2.0-19 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-3354 None

CVE-2022-3872 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-3872
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-3872
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 1.0 ARM qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
4.2.0-48 Unknown None
CBL Mariner 1.0 x64 qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
4.2.0-48 Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
6.2.0-12 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
6.2.0-12 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-3872 None

CVE-2022-4144 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-4144
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-4144
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
6.2.0-12 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
6.2.0-12 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-4144 None

CVE-2023-45288 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-45288
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Apr-24    

Information published.


1.0    20-Apr-24    

Information published.


1.0    30-Jun-24    

Information published.


1.0    02-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-45288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM docker-buildx (CBL-Mariner)
docker-compose (CBL-Mariner)
ig (CBL-Mariner)
kubernetes (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
0.14.0-1
2.27.0-1
0.29.0-1
1.30.1-1
None
Azure Linux 3.0 x64 docker-buildx (CBL-Mariner)
docker-compose (CBL-Mariner)
ig (CBL-Mariner)
kubernetes (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
0.14.0-1
2.27.0-1
0.29.0-1
1.30.1-1
None
CBL Mariner 2.0 ARM blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
cri-tools (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.1.2-3
1.11.2-9
1.11.1-8
1.29.0-2
None
CBL Mariner 2.0 x64 blobfuse2 (CBL-Mariner)
cert-manager (CBL-Mariner)
coredns (CBL-Mariner)
cri-tools (CBL-Mariner)
Unknown Unknown Base: N/A
Temporal: N/A
Vector: N/A
2.1.2-3
1.11.2-9
1.11.1-8
1.29.0-2
None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-45288 None

CVE-2024-38571 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38571
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38571
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38571 None

CVE-2024-42077 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42077
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42077
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42077 None

CVE-2023-29404 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-29404
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    14-Jun-23    

Information published.


1.0    09-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-29404
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM golang (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.22.6-1 Unknown None
Azure Linux 3.0 x64 golang (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.22.6-1 Unknown None
CBL Mariner 2.0 ARM msft-golang (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.19.10-1 Unknown None
CBL Mariner 2.0 x64 msft-golang (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.19.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-29404 None

CVE-2023-29402 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-29402
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.8/TemporalScore:9.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    12-Jun-23    

Information published.


1.0    09-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-29402
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM golang (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.22.6-1 Unknown None
Azure Linux 3.0 x64 golang (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.22.6-1 Unknown None
CBL Mariner 2.0 ARM msft-golang (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.19.10-1 Unknown None
CBL Mariner 2.0 x64 msft-golang (CBL-Mariner) Unknown Unknown None Base: 9.8
Temporal: 9.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1.19.10-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-29402 None

CVE-2024-39473 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39473
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39473
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39473 None

CVE-2024-26900 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26900
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26900
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.159.1-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.159.1-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26900 None

CVE-2024-39474 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39474
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39474
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39474 None

CVE-2024-42073 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42073
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42073
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42073 None

CVE-2024-42074 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42074
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42074
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42074 None

CVE-2024-42075 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42075
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42075
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42075 None

CVE-2024-42078 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42078
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42078
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42078 None

CVE-2017-18207 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2017-18207
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-20    

Information published.


1.0    30-Jun-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2017-18207
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2.7.18-5 Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
2.7.18-5 Unknown None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2017-18207 None

CVE-2019-3816 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-3816
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    02-Apr-24    

Information published.


1.0    30-Jun-24    

Information published.


1.0    02-Jul-24    

Information published.


1.0    03-Jul-24    

Information published.


1.0    04-Jul-24    

Information published.


1.0    05-Jul-24    

Information published.


1.0    06-Jul-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-3816
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Unknown Unknown None
CBL Mariner 2.0 ARM openwsman (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6.8-13 Unknown None
CBL Mariner 2.0 x64 openwsman (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.6.8-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-3816 None

CVE-2019-20907 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2019-20907
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-20    

Information published.


1.0    30-Jun-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2019-20907
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5
3.7.10-3
None
CBL Mariner 1.0 x64 python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.7.18-5
3.7.10-3
None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2019-20907 None

CVE-2021-23336 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-23336
MITRE
NVD

Issuing CNA: report@snyk.io

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.9/TemporalScore:5.9
Base score metrics
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    27-Feb-21    

Information published.


1.0    30-Jun-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-23336
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
2.7.18-6
3.7.10-3
None
CBL Mariner 1.0 x64 python2 (CBL-Mariner)
python3 (CBL-Mariner)
Unknown Unknown Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
2.7.18-6
3.7.10-3
None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 5.9
Temporal: 5.9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-23336 None

CVE-2017-17522 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2017-17522
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.8/TemporalScore:8.8
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    18-Aug-20    

Information published.


1.0    30-Jun-24    

Information published.


1.0    08-Jul-24    

Information published.


1.0    09-Jul-24    

Information published.


1.0    10-Jul-24    

Information published.


1.0    12-Jul-24    

Information published.


1.0    13-Jul-24    

Information published.


1.0    14-Jul-24    

Information published.


1.0    15-Jul-24    

Information published.


1.0    16-Jul-24    

Information published.


1.0    17-Jul-24    

Information published.


1.0    19-Jul-24    

Information published.


1.0    20-Jul-24    

Information published.


1.0    21-Jul-24    

Information published.


1.0    22-Jul-24    

Information published.


1.0    23-Jul-24    

Information published.


1.0    24-Jul-24    

Information published.


1.0    25-Jul-24    

Information published.


1.0    26-Jul-24    

Information published.


1.0    27-Jul-24    

Information published.


1.0    28-Jul-24    

Information published.


1.0    29-Jul-24    

Information published.


1.0    02-Aug-24    

Information published.


1.0    03-Aug-24    

Information published.


1.0    04-Aug-24    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2017-17522
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 1.0 ARM python2 (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2.7.18-3 Unknown None
CBL Mariner 1.0 x64 python2 (CBL-Mariner) Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
2.7.18-3 Unknown None
CBL Mariner 2.0 ARM Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 2.0 x64 Unknown Unknown None Base: 8.8
Temporal: 8.8
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Unknown Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2017-17522 None

CVE-2024-0853 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-0853
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityLow
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-0853
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM curl (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
8.8.0-1 Unknown None
CBL Mariner 2.0 x64 curl (CBL-Mariner) Unknown Unknown None Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
8.8.0-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-0853 None

CVE-2024-2004 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2004
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.5/TemporalScore:3.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionRequired
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2004
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM curl (CBL-Mariner) Unknown Unknown None Base: 3.5
Temporal: 3.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
8.8.0-1 Unknown None
CBL Mariner 2.0 x64 curl (CBL-Mariner) Unknown Unknown None Base: 3.5
Temporal: 3.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N
8.8.0-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2004 None

CVE-2024-2398 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-2398
MITRE
NVD

Issuing CNA: 2499f714-1537-4658-8207-48ae4bb9eae9

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.6/TemporalScore:8.6
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityLow
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-2398
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM curl (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
8.8.0-1 Unknown None
CBL Mariner 2.0 x64 curl (CBL-Mariner) Unknown Unknown None Base: 8.6
Temporal: 8.6
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
8.8.0-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-2398 None

CVE-2024-38662 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38662
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:4.7/TemporalScore:4.7
Base score metrics
Attack VectorLocal
Attack ComplexityHigh
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38662
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 4.7
Temporal: 4.7
Vector: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38662 None

CVE-2024-36288 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-36288
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-36288
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-36288 None

CVE-2024-39480 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39480
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39480
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39480 None

CVE-2024-39476 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39476
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39476
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39476 None

CVE-2024-39475 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39475
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39475
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39475 None

CVE-2024-37371 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-37371
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-37371
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM krb5 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
1.21.3-1 Unknown None
CBL Mariner 2.0 x64 krb5 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
1.21.3-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-37371 None

CVE-2024-26461 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-26461
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-26461
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM krb5 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
1.21.3-1 Unknown None
CBL Mariner 2.0 x64 krb5 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
1.21.3-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-26461 None

CVE-2024-37370 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-37370
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:
None
Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-37370
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM krb5 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
1.21.3-1 Unknown None
CBL Mariner 2.0 x64 krb5 (CBL-Mariner) Unknown Unknown None Base: N/A
Temporal: N/A
Vector: N/A
1.21.3-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-37370 None

CVE-2024-6104 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6104
MITRE
NVD

Issuing CNA: security@hashicorp.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6104
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM skopeo (CBL-Mariner)
terraform (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.14.2-7
1.3.2-17
None
CBL Mariner 2.0 x64 skopeo (CBL-Mariner)
terraform (CBL-Mariner)
Unknown Unknown Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
1.14.2-7
1.3.2-17
None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6104 None

CVE-2024-6257 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-6257
MITRE
NVD

Issuing CNA: security@hashicorp.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.4/TemporalScore:8.4
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionRequired
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-6257
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM terraform (CBL-Mariner) Unknown Unknown None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
1.3.2-17 Unknown None
CBL Mariner 2.0 x64 terraform (CBL-Mariner) Unknown Unknown None Base: 8.4
Temporal: 8.4
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H
1.3.2-17 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-6257 None

CVE-2021-3750 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2021-3750
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:8.2/TemporalScore:8.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    17-May-22    

Information published.


1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2021-3750
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 1.0 ARM qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
4.2.0-41 Unknown None
CBL Mariner 1.0 x64 qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
4.2.0-41 Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.2.0-16 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 8.2
Temporal: 8.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
6.2.0-16 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2021-3750 None

CVE-2022-0358 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-0358
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-0358
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 1.0 ARM qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.2.0-48 Unknown None
CBL Mariner 1.0 x64 qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.2.0-48 Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.2.0-5 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.2.0-5 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-0358 None

CVE-2022-26354 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-26354
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:3.2/TemporalScore:3.2
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
ScopeChanged
ConfidentialityNone
IntegrityNone
AvailabilityLow
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-26354
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 3.2
Temporal: 3.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 3.2
Temporal: 3.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
Unknown Unknown None
CBL Mariner 1.0 ARM qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 3.2
Temporal: 3.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
4.2.0-48 Unknown None
CBL Mariner 1.0 x64 qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 3.2
Temporal: 3.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
4.2.0-48 Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 3.2
Temporal: 3.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
6.2.0-2 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 3.2
Temporal: 3.2
Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:L
6.2.0-2 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-26354 None

CVE-2022-3165 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-3165
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:6.5/TemporalScore:6.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-3165
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Unknown Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.2.0-15 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 6.5
Temporal: 6.5
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.2.0-15 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-3165 None

CVE-2022-2962 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-2962
MITRE
NVD

Issuing CNA: secalert@redhat.com

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    05-Aug-24    

Information published.


1.0    06-Aug-24    

Information published.


1.0    07-Aug-24    

Information published.


1.0    08-Aug-24    

Information published.


1.0    09-Aug-24    

Information published.


1.0    10-Aug-24    

Information published.


1.0    11-Aug-24    

Information published.


1.0    12-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-2962
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
Azure Linux 3.0 x64 Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Unknown Unknown None
CBL Mariner 1.0 ARM qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.2.0-48 Unknown None
CBL Mariner 1.0 x64 qemu-kvm (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
4.2.0-48 Unknown None
CBL Mariner 2.0 ARM qemu (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.2.0-13 Unknown None
CBL Mariner 2.0 x64 qemu (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
6.2.0-13 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-2962 None

CVE-2024-23722 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-23722
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Apr-24    

Information published.


1.0    06-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-23722
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM fluent-bit (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.2.2-1 Unknown None
CBL Mariner 2.0 x64 fluent-bit (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
2.2.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-23722 None

CVE-2024-40898 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-40898
MITRE
NVD

Issuing CNA: security@apache.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    26-Jul-24    

Information published.


1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-40898
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM httpd (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.62-1 Unknown None
CBL Mariner 2.0 x64 httpd (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
2.4.62-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-40898 None

CVE-2024-38583 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38583
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38583
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38583 None

CVE-2024-39493 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39493
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39493
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39493 None

CVE-2024-42068 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42068
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42068
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42068 None

CVE-2024-39489 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39489
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39489
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39489 None

CVE-2024-42070 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42070
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42070
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42070 None

CVE-2024-42076 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42076
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42076
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42076 None

CVE-2024-42080 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42080
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42080
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42080 None

CVE-2024-38428 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-38428
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:9.1/TemporalScore:9.1
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    30-Jun-24    

Information published.


1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-38428
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM wget (CBL-Mariner) Unknown Unknown None Base: 9.1
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1.21.2-3 Unknown None
CBL Mariner 2.0 x64 wget (CBL-Mariner) Unknown Unknown None Base: 9.1
Temporal: 9.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
1.21.2-3 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-38428 None

CVE-2024-42082 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42082
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42082
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42082 None

CVE-2022-41722 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-41722
MITRE
NVD

Issuing CNA: security@golang.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    01-Mar-23    

Information published.


1.0    09-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-41722
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM golang (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1.22.6-1 Unknown None
Azure Linux 3.0 x64 golang (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1.22.6-1 Unknown None
CBL Mariner 2.0 ARM msft-golang (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1.19.8-1 Unknown None
CBL Mariner 2.0 x64 msft-golang (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1.19.8-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-41722 None

CVE-2022-29526 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-29526
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.3/TemporalScore:5.3
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityLow
IntegrityNone
AvailabilityNone
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    08-Nov-23    

Information published.


2.0    24-Jan-24    

Added nmi to CBL-Mariner 2.0 Added sriov-network-device-plugin to CBL-Mariner 2.0


3.0    11-Apr-24    

Added cri-o to CBL-Mariner 2.0


1.0    30-Jun-24    

Information published.


1.0    09-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-29526
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
Azure Linux 3.0 ARM golang (CBL-Mariner)
keda (CBL-Mariner)
moby-engine (CBL-Mariner)
node-problem-detector (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1.22.6-1
2.14.0-1
25.0.3-1
0.8.15-1
None
Azure Linux 3.0 x64 golang (CBL-Mariner)
keda (CBL-Mariner)
moby-engine (CBL-Mariner)
node-problem-detector (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1.22.6-1
2.14.0-1
25.0.3-1
0.8.15-1
None
CBL Mariner 2.0 ARM azcopy (CBL-Mariner)
cri-o (CBL-Mariner)
git-lfs (CBL-Mariner)
kata-containers (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
10.24.0-1
1.21.7-2
3.4.1-1
3.2.0.azl2-1
None
CBL Mariner 2.0 x64 azcopy (CBL-Mariner)
cri-o (CBL-Mariner)
git-lfs (CBL-Mariner)
kata-containers (CBL-Mariner)
Unknown Unknown Base: 5.3
Temporal: 5.3
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
10.24.0-1
1.21.7-2
3.4.1-1
3.2.0.azl2-1
None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-29526 None

CVE-2022-48788 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-48788
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-48788
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-48788 None

CVE-2023-52340 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2023-52340
MITRE
NVD

Issuing CNA: cve@mitre.org

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.5/TemporalScore:7.5
Base score metrics
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2023-52340
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.5
Temporal: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2023-52340 None

CVE-2022-48841 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2022-48841
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2022-48841
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2022-48841 None

CVE-2024-39485 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39485
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39485
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39485 None

CVE-2024-39483 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-39483
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-39483
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-39483 None

CVE-2024-42071 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42071
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42071
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42071 None

CVE-2024-42072 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42072
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:7.8/TemporalScore:7.8
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42072
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 7.8
Temporal: 7.8
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42072 None

CVE-2024-42237 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42237
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42237
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42237 None

CVE-2024-42083 - Unknown

(top)
CVE ID Vulnerability Description Maximum Severity Rating Vulnerability Impact
CVE-2024-42083
MITRE
NVD

Issuing CNA: 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVE Title: Unknown
CVSS:

CVSS:3.1 Highest BaseScore:5.5/TemporalScore:5.5
Base score metrics
Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
ScopeUnchanged
ConfidentialityNone
IntegrityNone
AvailabilityHigh
Temporal score metrics

Executive Summary:
None
FAQ:
None
Mitigations:
None
Workarounds:
None
Revision:
1.0    10-Aug-24    

Information published.


Unknown Unknown

Exploitability Index

The following table provides an exploitability assessment of each of the vulnerabilities addressed this month. The vulnerabilities are listed in order of bulletin ID then CVE ID. Only vulnerabilities that have a severity rating of Critical or Important in the bulletins are included.

Exploitability Assessment Publicly Disclosed Exploited
Not Found Not Found Not Found

Affected Software

The following tables list the affected software details for the vulnerability.

CVE-2024-42083
Product KB Article Severity Impact Supercedence CVSS Score Set Fixed Build Restart Required Known Issue
CBL Mariner 2.0 ARM kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None
CBL Mariner 2.0 x64 kernel (CBL-Mariner) Unknown Unknown None Base: 5.5
Temporal: 5.5
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.15.162.2-1 Unknown None

Acknowledgements

CVE ID Acknowledgements
CVE-2024-42083 None