Microsoft Patch Tuesday-August 2024

Microsoft Patch Tuesday-August 2024


Microsoft patched 90 CVEs in its August 2024 Patch Tuesday release, with seven rated critical, 82 rated as important, and one rated as moderate.

This includes updates for vulnerabilities in Microsoft Office and Components, Microsoft Windows DNS, Windows TCP/IP, Microsoft Teams, Windows Secure Boot, Windows Secure Kernel Mode, Windows Security Center, Windows SmartScreen, Windows App Installer, Windows Scripting, and more.

Microsoft has fixed several flaws in multiple software, including Spoofing, Denial of Service (DoS), Elevation of Privilege (EoP), Cross-site Scripting (XSS), Information Disclosure, Security Feature Bypass, and Remote Code Execution (RCE).

Vulnerability CategoryQuantity
Elevation of Privilege Vulnerability34
Remote Code Execution Vulnerability28
Information Disclosure Vulnerability7
Denial of Service Vulnerability6
Spoofing Vulnerability5
Security Feature Bypass Vulnerability4
Cross-site Scripting Vulnerability1
Advertisements

Microsoft Copilot Studio Information Disclosure Vulnerability

CVE-2024-38206 is a critical severity information disclosure vulnerability with a CVSSv3 score of 8.5  affecting Microsoft’s Copilot Studio, an AI-powered chatbot. This vulnerability abused by an authenticated attacker to bypass server-side request forgery (SSRF) protections in order to leak potentially sensitive information. The vulnerability was released by Microsoft on August 6, with the advisory noting that no user action is required as the issue has been patched by Microsoft.

Azure Health Bot Elevation of Privilege Vulnerability

CVE-2024-38109 is a critical severity EoP vulnerability with a CVSSv3 score of 9.1 affecting Azure Health Bot. This vulnerability stems as a result of a SSRF vulnerability in Azure Health Bot that can be abused to escalate privileges. The issue has been patched by Microsoft and no action is required for users of the Health Bot service.

Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38106, CVE-2024-38133 and CVE-2024-38153 are EoP vulnerabilities affecting the Windows Kernel. CVE-2024-38133 and CVE-2024-38153 has a CVSSv3 scores of 7.8, while CVE-2024-38106 has a CVSSv3 score of 7. The exploitability requirements of the attacker needing to win a race condition for successful exploitation, CVE-2024-38106 was reportedly exploited in the wild as a zero-day. CVE-2024-38133 and CVE-2024-38153 were not listed as being exploited, Successful exploitation of these vulnerabilities could allow the attacker to elevate privileges to SYSTEM.

Advertisements

Windows Power Dependency Coordinator Elevation of Privilege Vulnerability

CVE-2024-38107 is an EoP Vulnerability with a CVSSv3 score of 7.8 affecting Windows Power Dependency Coordinator (pdc.sys), a driver responsible for power management on a Windows system. This vulnerability was exploited in the wild as a zero-day, though no specific details about exploitation were available at the time this blog was published.

Scripting Engine Memory Corruption Vulnerability

CVE-2024-38178 is a Scripting Engine memory corruption vulnerability with a CVSSv3 score of 7.5  in Windows Scripting. An authenticated victim must have Edge in Internet Explorer Mode as a prerequisite for exploitation prior to an unauthenticated attacker convincing the victim to click a specially crafted URL to obtain RCE.

Microsoft Project Remote Code Execution Vulnerability

CVE-2024-38189 is a RCE vulnerability with a CVSSv3 score of 8.8 affecting Microsoft Project, a project management tool and was exploited in the wild. Exploitation requires an unsuspecting victim to open a crafted Microsoft Office Project file. Additionally, the system must be configured to have the “Block macros from running in Office files from the Internet policy” disabled as well as have the VBA Macro Notification Settings disabled in order for a successful attack. Microsoft’s advisory does clarify that the Preview Pane is not an attack vector for this vulnerability and offers mitigation options to protect systems if immediate patching cannot be immediately performed.

Advertisements

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVE-2024-38141 and CVE-2024-38193 are EoP vulnerabilities with a CVSSv3 scores of 7.8 affecting the Windows Ancillary Function Driver for Winsock (afd.sys). These can allow an attacker to escalate privileges to SYSTEM. CVE-2024-38141 is rated as “Exploitation More Likely” and CVE-2024-38193 was reported to have been exploited in the wild as a zero-day vulnerability.

Windows Mark of the Web Security Feature Bypass Vulnerability

CVE-2024-38213 is a security feature bypass vulnerability with an assigned CVSSv3 score of 6.5. Exploitation of this vulnerability requires a user to open a specially crafted file, which could be hosted on a file server, website or sent via a phishing email. If the attacker is successful in convincing a victim to open this file, they could bypass the Windows SmartScreen user experience. Microsoft has flagged this as “Exploitation Detected” as they are aware of an instance of this vulnerability being exploited.

Windows Update Stack Elevation of Privilege Vulnerability

CVE-2024-38163 and CVE-2024-38202 are both EoP vulnerabilities in Windows Update Stack and were assigned CVSSv3 scores of 7.8 and 7.3 respectively. CVE-2024-38163, if successfully exploited could result in gaining SYSTEM privileges. Microsoft has noted that users don’t need to take any action for this vulnerability as it is only exploitable at run time and the impacted version of WinRE has been superseded by a new version.

CVE-2024-38202 vulnerability which exists in Windows Backup, allows a user with basic privileges to “reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS)”. This vulnerability resides in the Windows Update mechanism that could allow unauthorized elevation of privileges by enforcing the downgrade of system components. This vulnerability exposes systems to previously patched exploits, making them susceptible to attacks that could leverage these old vulnerabilities. Microsoft has noted that an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.

Advertisements

Windows TCP/IP Remote Code Execution Vulnerability

CVE-2024-38063 is a critical RCE vulnerability affecting Windows TCP/IP with a CVSSv3 score of 9.8. An attacker could remotely exploit this vulnerability by sending specially crafted IPv6 packets to a host. Microsoft’s mitigation suggestions suggest disabling IPv6 as only IPv6 packets can be abused to exploit this vulnerability.

Microsoft Office Spoofing Vulnerability

CVE-2024-38200 is a spoofing vulnerability affecting Microsoft Office with a CVSSv3 score of 6.5. An attacker could leverage this vulnerability with a specially crafted file that a victim would need to interact with. This could be achieved by hosting it on a file server or website and convincing the victim to click on the file or similarly it could be included in a phishing email. Successful exploitation of the vulnerability could result in the victim exposing NTLM hashes to a remote attacker.

Windows Secure Kernel Mode Elevation of Privilege Vulnerability

CVE-2024-21302 and CVE-2024-38142 are both elevation of privilege vulnerabilities in Windows Secure Kernel . CVE-2024-21302 carries a CVSSv3 score of 6.7 and CVE-2024-38142 a score of 7.8 with successful exploitation of either of these vulnerabilities resulting in an attacker gaining SYSTEM privileges.

Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability

CVE-2024-38199 is a RCE vulnerability with a CVSSv3 score of 9.8 in Windows Line Printer Daemon (LPD) Service. A remote attacker could exploit this across a network by dispatching a specially crafted print task to Windows LPD Service, if successful it would result in RCE on the server. Microsoft has also noted that it was publicly disclosed prior to a patch being available.

Advertisements

Patch Tuesday Summary

CVE IDTitleSeverity
CVE-2024-38109Azure Health Bot Elevation of Privilege VulnerabilityCritical
CVE-2024-38206Microsoft Copilot Studio Information Disclosure VulnerabilityCritical
CVE-2024-38166Microsoft Dynamics 365 Cross-site Scripting VulnerabilityCritical
CVE-2024-38140Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution VulnerabilityCritical
CVE-2024-38160Windows Network Virtualization Remote Code Execution VulnerabilityCritical
CVE-2024-38159Windows Network Virtualization Remote Code Execution VulnerabilityCritical
CVE-2022-3775Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequencesCritical
CVE-2023-40547Redhat: CVE-2023-40547 Shim – RCE in HTTP boot support may lead to secure boot bypassCritical
CVE-2024-38063Windows TCP/IP Remote Code Execution VulnerabilityCritical
CVE-2024-38168.NET and Visual Studio Denial of Service VulnerabilityImportant
CVE-2024-38167.NET and Visual Studio Information Disclosure VulnerabilityImportant
CVE-2024-38162Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
CVE-2024-38098Azure Connected Machine Agent Elevation of Privilege VulnerabilityImportant
CVE-2024-38195Azure CycleCloud Remote Code Execution VulnerabilityImportant
CVE-2024-38158Azure IoT SDK Remote Code Execution VulnerabilityImportant
CVE-2024-38157Azure IoT SDK Remote Code Execution VulnerabilityImportant
CVE-2024-38108Azure Stack Hub Spoofing VulnerabilityImportant
CVE-2024-38201Azure Stack Hub Elevation of Privilege VulnerabilityImportant
CVE-2024-38199Windows Line Printer Daemon (LPD) Service Remote Code Execution VulnerabilityImportant
CVE-2024-38123Windows Bluetooth Driver Information Disclosure VulnerabilityImportant
CVE-2024-38211Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityImportant
CVE-2024-38218Microsoft Edge (HTML-based) Memory Corruption VulnerabilityImportant
CVE-2024-38118Microsoft Local Security Authority (LSA) Server Information Disclosure VulnerabilityImportant
CVE-2024-38122Microsoft Local Security Authority (LSA) Server Information Disclosure VulnerabilityImportant
CVE-2024-38200Microsoft Office Spoofing VulnerabilityImportant
CVE-2024-38084Microsoft OfficePlus Elevation of Privilege VulnerabilityImportant
CVE-2024-38172Microsoft Excel Remote Code Execution VulnerabilityImportant
CVE-2024-38170Microsoft Excel Remote Code Execution VulnerabilityImportant
CVE-2024-38173Microsoft Outlook Remote Code Execution VulnerabilityImportant
CVE-2024-38171Microsoft PowerPoint Remote Code Execution VulnerabilityImportant
CVE-2024-38189Microsoft Project Remote Code Execution VulnerabilityImportant
CVE-2024-38169Microsoft Office Visio Remote Code Execution VulnerabilityImportant
CVE-2024-38134Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38144Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38125Kernel Streaming WOW Thunk Service Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38197Microsoft Teams for iOS Spoofing VulnerabilityImportant
CVE-2024-38152Windows OLE Remote Code Execution VulnerabilityImportant
CVE-2024-37968Windows DNS Spoofing VulnerabilityImportant
CVE-2024-38141Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
CVE-2024-38193Windows Ancillary Function Driver for WinSock Elevation of Privilege VulnerabilityImportant
CVE-2024-38177Windows App Installer Spoofing VulnerabilityImportant
CVE-2024-38131Clipboard Virtual Channel Extension Remote Code Execution VulnerabilityImportant
CVE-2024-38215Windows Cloud Files Mini Filter Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38196Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38165Windows Compressed Folder Tampering VulnerabilityImportant
CVE-2024-38138Windows Deployment Services Remote Code Execution VulnerabilityImportant
CVE-2024-38150Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
CVE-2024-38147Microsoft DWM Core Library Elevation of Privilege VulnerabilityImportant
CVE-2024-38223Windows Initial Machine Configuration Elevation of Privilege VulnerabilityImportant
CVE-2024-38114Windows IP Routing Management Snapin Remote Code Execution VulnerabilityImportant
CVE-2024-38116Windows IP Routing Management Snapin Remote Code Execution VulnerabilityImportant
CVE-2024-38115Windows IP Routing Management Snapin Remote Code Execution VulnerabilityImportant
CVE-2024-29995Windows Kerberos Elevation of Privilege VulnerabilityImportant
CVE-2024-38151Windows Kernel Information Disclosure VulnerabilityImportant
CVE-2024-38133Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2024-38127Windows Hyper-V Elevation of Privilege VulnerabilityImportant
CVE-2024-38153Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2024-38106Windows Kernel Elevation of Privilege VulnerabilityImportant
CVE-2024-38187Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38191Kernel Streaming Service Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38184Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38186Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38185Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportant
CVE-2024-38146Windows Layer-2 Bridge Network Driver Denial of Service VulnerabilityImportant
CVE-2024-38145Windows Layer-2 Bridge Network Driver Denial of Service VulnerabilityImportant
CVE-2024-38161Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
CVE-2024-38132Windows Network Address Translation (NAT) Denial of Service VulnerabilityImportant
CVE-2024-38126Windows Network Address Translation (NAT) Denial of Service VulnerabilityImportant
CVE-2024-38135Windows Resilient File System (ReFS) Elevation of Privilege VulnerabilityImportant
CVE-2024-38117NTFS Elevation of Privilege VulnerabilityImportant
CVE-2024-38107Windows Power Dependency Coordinator Elevation of Privilege VulnerabilityImportant
CVE-2024-38198Windows Print Spooler Elevation of Privilege VulnerabilityImportant
CVE-2024-38137Windows Resource Manager PSM Service Extension Elevation of Privilege VulnerabilityImportant
CVE-2024-38136Windows Resource Manager PSM Service Extension Elevation of Privilege VulnerabilityImportant
CVE-2024-38130Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
CVE-2024-38128Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
CVE-2024-38154Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
CVE-2024-38121Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
CVE-2024-38214Windows Routing and Remote Access Service (RRAS) Information Disclosure VulnerabilityImportant
CVE-2024-38120Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
CVE-2024-38178Scripting Engine Memory Corruption VulnerabilityImportant
CVE-2024-21302Windows Secure Kernel Mode Elevation of Privilege VulnerabilityImportant
CVE-2024-38142Windows Secure Kernel Mode Elevation of Privilege VulnerabilityImportant
CVE-2024-38155Security Center Broker Information Disclosure VulnerabilityImportant
CVE-2024-38180Windows SmartScreen Security Feature Bypass VulnerabilityImportant
CVE-2024-38148Windows Secure Channel Denial of Service VulnerabilityImportant
CVE-2024-38202Windows Update Stack Elevation of Privilege VulnerabilityImportant
CVE-2024-38163Windows Update Stack Elevation of Privilege VulnerabilityImportant
CVE-2024-38143Windows WLAN AutoConfig Service Elevation of Privilege VulnerabilityImportant
CVE-2024-38213Windows Mark of the Web Security Feature Bypass VulnerabilityModerate

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.