Microsoft Patch Tuesday June 2024

Microsoft Patch Tuesday June 2024


Microsoft addresses 51 CVEs in its June 2024 Patch Tuesday release with one rated as critical and no zero-day or publicly disclosed vulnerabilities. This includes CVE-2023-50868 that’s been issued by MITRE and CVE-2024-29187 that’s been issued by GitHub.

Those 51 fixed vulnerabilities are divided within below categories

  • 25 Elevation of Privilege Vulnerabilities
  • 18 Remote Code Execution Vulnerabilities
  • 3 Information Disclosure Vulnerabilities
  • 5 Denial of Service Vulnerabilities

Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

The vulnerability tracked as CVE-2024-30080 with a CVSSv3 score of 9.8 is a RCE vulnerability in the Microsoft Message Queuing (MSMQ) component of Windows operating systems. An unauthenticated, remote attacker could exploit this vulnerability by sending a specially crafted packet to a vulnerable target. Microsoft rates this vulnerability as Exploitation More Likely .

MSMQ service must be added and enabled so that the system will be made vulnerable. According to Microsoft, if the service is enabled on a Windows installation, a service named “Message Queueing” will be running on TCP port 1801. CVE-2024-30080 is the fourth RCE affecting MSMQ patched in 2024, with two addressed in the April Patch Tuesday (CVE-2024-26232, CVE-2024-26208) and one in February Patch Tuesday (CVE-2024-21363).

Advertisements

Win32k Elevation of Privilege Vulnerability

The vulnerabilities tracked as CVE-2024-30082, CVE-2024-30087 and CVE-2024-30091 are EoP vulnerabilities in Microsoft’s Win32k, a core kernel-side driver used in Windows. All three bugs has a  CVSSv3 score of 7.8 and rated as Exploitation More Likely.

In last few years, we have seen multiple Win32k EoP zero days exploited in the wild. In the May 2023 Patch Tuesday release, Microsoft patched CVE-2023-29336. In the January 2022 Patch Tuesday release, Microsoft patched CVE-2022-21882. CVE-2022-21882 was reportedly a patch bypass for CVE-2021-1732, another Win32k EoP zero-day vulnerability from February 2021. In October 2021, Microsoft patched CVE-2021-40449, another Win32k EoP zero day linked to a remote access trojan known as MysterySnail and was reportedly a patch bypass for CVE-2016-3309.

Windows Kernel Elevation of Privilege Vulnerability

The vulnerabilities tracked as CVE-2024-30064, CVE-2024-30068, both with a CVSSv3 score of 7.0 and CVE-2024-30088, CVE-2024-30099, both with a CVSSv3 score of 8.8 are EoP vulnerabilities affecting the Windows Kernel. The former two rated as exploitation less likely and  latter two rated as exploitation more likely. Successful exploitation of these vulnerabilities could lead to an attacker gaining elevated privileges and Microsoft’s advisories for CVE-2024-30068, CVE-2024-30088 and CVE-2024-30099 make mention that an attacker could gain SYSTEM privileges.

Advertisements

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

The vulnerability tracked as CVE-2024-30085, with a CVSSv3 score of 7.8 is an EoP vulnerability in the Microsoft Windows Cloud Files Mini Filter Driver (cldflt.sys). It is rated as Exploitation More Likely. An attacker could exploit this vulnerability as part of post-compromise activity to elevate privileges to SYSTEM. This is the second EoP affecting Windows Cloud Files Mini Filter Driver patched in 2024. The first was CVE-2024-21310 which was patched as part of the January 2024 Patch Tuesday release.

Microsoft Streaming Service Elevation of Privilege Vulnerability

The vulnerability tracked as CVE-2024-30089 with a CVSSv3 score of 7.8 is an EoP vulnerability in the Microsoft Streaming Service. An attacker could exploit this vulnerability as part of post-compromise activity to elevate privileges to SYSTEM.

MITRE: CVE-2023-50868

CVE-2023-50868 is a vulnerability in DNSSEC validation where an attacker could exploit standard DNSSEC protocols intended for DNS integrity by using excessive resources on a resolver, causing a denial of service for legitimate users. MITRE created this CVE on their behalf.

This flaw was previously disclosed in February and patched in numerous DNS implementations, including BIND, PowerDNS, Unbound, Knot Resolver, and Dnsmasq. This is a publicly disclosed zero-day vulnerability and it’s a previously disclosed ‘Keytrap’ attack in the DNS protocol that Microsoft has now fixed as part of today’s updates.

Advertisements

Windows 10 21H2 End of Life

Microsoft announced that Windows 10 21H2 has reached its end of life for Enterprise, Education, IoT Enterprise, and Enterprise multi-session editions. This means that users of these versions of Windows 10 21H2 will no longer receive security updates and should upgrade as soon as possible.

Release summary

CVE/AdvisoryTitleSeverity RatingExploitedPublicly Disclosed
CVE-2024-30080Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityCriticalNoNo
CVE-2024-30069Windows Remote Access Connection Manager Information Disclosure VulnerabilityImportantNoNo
CVE-2024-30070DHCP Server Service Denial of Service VulnerabilityImportantNoNo
CVE-2024-30072Microsoft Event Trace Log File Parsing Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30074Windows Link Layer Topology Discovery Protocol Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30075Windows Link Layer Topology Discovery Protocol Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30076Windows Container Manager Service Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30077Windows OLE Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30078Windows Wi-Fi Driver Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30082Win32k Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-35250Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-35255Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege VulnerabilityImportantNoNo
CVE-2023-50868MITRE: CVE-2023-50868 NSEC3 closest encloser proof can exhaust CPUImportantNoYes
CVE-2024-29187GitHub: CVE-2024-29187 WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEMImportantNoNo
CVE-2024-29060Visual Studio Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30062Windows Standards-Based Storage Management Service Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30063Windows Distributed File System (DFS) Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30064Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30065Windows Themes Denial of Service VulnerabilityImportantNoNo
CVE-2024-30066Winlogon Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30067Winlogon Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30068Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30083Windows Standards-Based Storage Management Service Denial of Service VulnerabilityImportantNoNo
CVE-2024-30084Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30085Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30086Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30087Win32k Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30088Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30089Microsoft Streaming Service Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30090Microsoft Streaming Service Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30091Win32k Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30093Windows Storage Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30094Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30095Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30096Windows Cryptographic Services Information Disclosure VulnerabilityImportantNoNo
CVE-2024-30097Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30099Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30100Microsoft SharePoint Server Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30101Microsoft Office Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30102Microsoft Office Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30103Microsoft Outlook Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-30104Microsoft Office Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-35248Microsoft Dynamics 365 Business Central Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-35249Microsoft Dynamics 365 Business Central Remote Code Execution VulnerabilityImportantNoNo
CVE-2024-35252Azure Storage Movement Client Library Denial of Service VulnerabilityImportantNoNo
CVE-2024-35253Microsoft Azure File Sync Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-35254Azure Monitor Agent Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-35263Microsoft Dynamics 365 (On-Premises) Information Disclosure VulnerabilityImportantNoNo
CVE-2024-35265Windows Perception Service Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-37325Azure Science Virtual Machine (DSVM) Elevation of Privilege VulnerabilityImportantNoNo
CVE-2024-30052Visual Studio Remote Code Execution VulnerabilityImportantNoNo

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.