
Microsoft patched 117 CVEs in October 2024 Patch Tuesday release, with three rated critical, 113 rated important and one rated moderate.
- 27 Elevation of Privilege vulnerabilities
- 7 Security Feature Bypass vulnerabilities
- 43 Remote Code Execution vulnerabilities
- 6 Information Disclosure vulnerabilities
- 26 Denial of Service vulnerabilities
- 7 Spoofing vulnerabilities
Based on the active exploitation evidence, CISA has added CVE-2024-43572 , CVE-2024-43573 to its Known exploited catalog
Microsoft Configuration Manager Remote Code Execution Vulnerability
The vulnerability tracked as CVE-2024-43468 is a RCE with a CVSSv3 score of 9.8in Microsoft Configuration. An attacker can leverage this vulnerability without prior authentication by sending a specially crafted request to a vulnerable machine resulting in RCE on the machine or its underlying database.
Microsoft has advised impacted users to install an in-console update as the only mitigation path, but has listed a workaround for users who cannot immediately implement the updates. The workaround suggested by Microsoft is to use an alternate service account for the Management point connection account in place of the default “Computer” account.
Windows Netlogon Elevation of Privilege Vulnerability
The vulnerability tracked as CVE-2024-38124 with a CVSSv3 score of 9.0. An attacker would need authenticated access to the same network as a vulnerable device and rename their machine to match the domain controller to establish a secure channel. If these prerequisites are met, the attacker would then need to rename their machine back to its original name and once the new domain controller is promoted, the attacker could use the secure channel to impersonate the domain controller and potentially compromise the entire domain.
No workarounds available, but if immediate patching is not an option, Microsoft has listed a handful of mitigating factors to consider:
- Avoid using predictable naming conventions on Domain Controllers
- Ensure Secure Channel validation requires more than just a matching computer name.
- Monitoring for the renaming of computers within the network.
- Consider enhanced authentication mechanisms.
Microsoft Management Console Remote Code Execution Vulnerability
The vulnerability tracked as CVE-2024-43572 with a CVSSv3 score of 7.8. An attacker could exploit this vulnerability by convincing a vulnerable target using social engineering tactics to open a specially crafted file. Successful exploitation would allow the attacker to execute arbitrary code.
This CVE-2024-43572 was exploited in the wild as a zero-day. This is the second month in a row that Microsoft patched a RCE vulnerability in the MMC, as Microsoft addressed CVE-2024-38259 in its September 2024 Patch Tuesday release. As part of its patch for CVE-2024-43572, Microsoft has altered the behavior for Microsoft Saved Console (MSC) files, preventing untrusted MSC files from being opened on a system.
Windows MSHTML Platform Spoofing Vulnerability
The vulnerability tracked as CVE-2024-43573 with a CVSSv3 score of 6.5, an unauthenticated, remote attacker could exploit this vulnerability by convincing a potential target to open a malicious file.
This vulnerability CVE-2024-43573 was exploited in the wild as a zero-day. This is the fourth zero-day vulnerability in the Windows MSHTML Platform that was exploited in the wild in 2024, which include CVE-2024-30040, a security feature bypass flaw that was patched in May 2024, CVE-2024-38112, a spoofing vulnerability that was patched in July 2024 and CVE-2024-43461, a spoofing vulnerability that was patched on September 10, 2024, though details about in-the-wild exploitation was not known until September 13, 2024. Both CVE-2024-38112 and CVE-2024-43461 were used as part of an exploit chain by an advanced persistent threat (APT) actor known as Void Banshee.
Windows Hyper-V Security Feature Bypass Vulnerability
The vulnerability tracked as CVE-2024-20659 with a CVSSv3 score of 7.1 is a security feature bypass vulnerability in Windows Hyper-V. This is likely because there are multiple conditions that need to be met for exploitation to be feasible, such as a user rebooting their machine and application specific behavior among other user-required actions. Successful exploitation would allow an attacker to bypass a Virtual Machine’s UEFI on the host machine, resulting in both the hypervisor and secure kernel being compromised. According to Microsoft, CVE-2024-20659 was publicly disclosed prior to a patch being made available.
In addition to CVE-2024-20659, Microsoft also addressed three denial of service (DoS) CVE-2024-43521, CVE-2024-43567, CVE-2024-43575 vulnerabilities and one RCE CVE-2024-3009 in Windows Hyper-V.
Winlogon Elevation of Privilege Vulnerability
The vulnerability tracked as CVE-2024-43583 with a CVSSv3 score of 7.8, a local authenticated attacker could exploit this vulnerability to gain SYSTEM privileges. According to Microsoft, CVE-2024-43583 was publicly disclosed prior to a patch being made available. In addition to applying the available patch for CVE-2024-43583, Microsoft recommends enabling Microsoft first-party Input Method Editor (IME) to thwart vulnerabilities within third-party IMEs.
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
The 12 vulnerabilities tracked as CVE-2024-38212, CVE-2024-38261, CVE-2024-38265, CVE-2024-43453, CVE-2024-43549, CVE-2024-43564, CVE-2024-43589, CVE-2024-43592, CVE-2024-43593, CVE-2024-43607, CVE-2024-43608 and CVE-2024-43611 are a series of RCE vulnerabilities in Windows Routing and Remote Access Service (RRAS) accounting for 10% of the vulnerabilities in the October Microsoft Patch Tuesday update. All 12 of these vulnerabilities share a common CVSSv3 score of 8.8 apart from CVE-2024-38261 which was assigned a score of 7.8.
They share similar attack paths based on Microsoft’s descriptions of the vulnerabilities. An attacker with no authentication could leverage this vulnerability by targeting a vulnerable server with a specially crafted protocol message or tricking a user to submit a request to a malicious server resulting in a malicious message being returned, which could lead to RCE on the vulnerable machine.
Remote Desktop Client Remote Code Execution Vulnerability
The 2 vulnerabilities tracked as CVE-2024-43533 and CVE-2024-43599 are a pair of RCE vulnerabilities with a CVSSv3 score of 8.8. The attack vector noted by Microsoft lists a prerequisite of an attacker first compromising a Remote Desktop Server. Once compromised, the attacker can leverage RCE against vulnerable connecting devices. As a mitigating factor and part of security best practices, it is suggested that the Remote Desktop service should be disabled if not needed. Microsoft’s advisory further explains that disabling unused services can help reduce exposure.
Patch Tuesday Summary
| CVE ID | CVE Title | Severity |
| CVE-2024-43468 | Microsoft Configuration Manager Remote Code Execution Vulnerability | Critical |
| CVE-2024-43488 | Visual Studio Code extension for Arduino Remote Code Execution Vulnerability | Critical |
| CVE-2024-43582 | Remote Desktop Protocol Server Remote Code Execution Vulnerability | Critical |
| CVE-2024-38229 | .NET and Visual Studio Remote Code Execution Vulnerability | Important |
| CVE-2024-43485 | .NET and Visual Studio Denial of Service Vulnerability | Important |
| CVE-2024-43484 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | Important |
| CVE-2024-43483 | .NET, .NET Framework, and Visual Studio Denial of Service Vulnerability | Important |
| CVE-2024-43591 | Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability | Important |
| CVE-2024-38097 | Azure Monitor Agent Elevation of Privilege Vulnerability | Important |
| CVE-2024-38179 | Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability | Important |
| CVE-2024-43506 | BranchCache Denial of Service Vulnerability | Important |
| CVE-2024-38149 | BranchCache Denial of Service Vulnerability | Important |
| CVE-2024-43585 | Code Integrity Guard Security Feature Bypass Vulnerability | Important |
| CVE-2024-43497 | DeepSpeed Remote Code Execution Vulnerability | Important |
| CVE-2024-43515 | Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability | Important |
| CVE-2024-43517 | Microsoft ActiveX Data Objects Remote Code Execution Vulnerability | Important |
| CVE-2024-43614 | Microsoft Defender for Endpoint for Linux Spoofing Vulnerability | Important |
| CVE-2024-43534 | Windows Graphics Component Information Disclosure Vulnerability | Important |
| CVE-2024-43508 | Windows Graphics Component Information Disclosure Vulnerability | Important |
| CVE-2024-43556 | Windows Graphics Component Elevation of Privilege Vulnerability | Important |
| CVE-2024-43509 | Windows Graphics Component Elevation of Privilege Vulnerability | Important |
| CVE-2024-43572 | Microsoft Management Console Remote Code Execution Vulnerability | Important |
| CVE-2024-43616 | Microsoft Office Remote Code Execution Vulnerability | Important |
| CVE-2024-43576 | Microsoft Office Remote Code Execution Vulnerability | Important |
| CVE-2024-43609 | Microsoft Office Spoofing Vulnerability | Important |
| CVE-2024-43504 | Microsoft Excel Remote Code Execution Vulnerability | Important |
| CVE-2024-43503 | Microsoft SharePoint Elevation of Privilege Vulnerability | Important |
| CVE-2024-43505 | Microsoft Office Visio Remote Code Execution Vulnerability | Important |
| CVE-2024-43544 | Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability | Important |
| CVE-2024-43541 | Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability | Important |
| CVE-2024-43519 | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability | Important |
| CVE-2024-43574 | Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability | Important |
| CVE-2024-43615 | Microsoft OpenSSH for Windows Remote Code Execution Vulnerability | Important |
| CVE-2024-43581 | Microsoft OpenSSH for Windows Remote Code Execution Vulnerability | Important |
| CVE-2024-38029 | Microsoft OpenSSH for Windows Remote Code Execution Vulnerability | Important |
| CVE-2024-43604 | Outlook for Android Elevation of Privilege Vulnerability | Important |
| CVE-2024-43612 | Power BI Report Server Spoofing Vulnerability | Important |
| CVE-2024-43481 | Power BI Report Server Spoofing Vulnerability | Important |
| CVE-2024-43533 | Remote Desktop Client Remote Code Execution Vulnerability | Important |
| CVE-2024-43599 | Remote Desktop Client Remote Code Execution Vulnerability | Important |
| CVE-2024-43521 | Windows Hyper-V Denial of Service Vulnerability | Important |
| CVE-2024-20659 | Windows Hyper-V Security Feature Bypass Vulnerability | Important |
| CVE-2024-43567 | Windows Hyper-V Denial of Service Vulnerability | Important |
| CVE-2024-43575 | Windows Hyper-V Denial of Service Vulnerability | Important |
| CVE-2024-43532 | Remote Registry Service Elevation of Privilege Vulnerability | Important |
| CVE-2024-43480 | Azure Service Fabric for Linux Remote Code Execution Vulnerability | Important |
| CVE-2024-43571 | Sudo for Windows Spoofing Vulnerability | Important |
| CVE-2024-43590 | Visual C++ Redistributable Installer Elevation of Privilege Vulnerability | Important |
| CVE-2024-43603 | Visual Studio Collector Service Denial of Service Vulnerability | Important |
| CVE-2024-43601 | Visual Studio Code for Linux Remote Code Execution Vulnerability | Important |
| CVE-2024-43563 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Important |
| CVE-2024-43513 | BitLocker Security Feature Bypass Vulnerability | Important |
| CVE-2024-43501 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Important |
| CVE-2024-43546 | Windows Cryptographic Information Disclosure Vulnerability | Important |
| CVE-2024-6197 | Open Source Curl Remote Code Execution Vulnerability | Important |
| CVE-2024-37982 | Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability | Important |
| CVE-2024-37976 | Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability | Important |
| CVE-2024-37983 | Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability | Important |
| CVE-2024-30092 | Windows Hyper-V Remote Code Execution Vulnerability | Important |
| CVE-2024-43547 | Windows Kerberos Information Disclosure Vulnerability | Important |
| CVE-2024-38129 | Windows Kerberos Elevation of Privilege Vulnerability | Important |
| CVE-2024-43502 | Windows Kernel Elevation of Privilege Vulnerability | Important |
| CVE-2024-43511 | Windows Kernel Elevation of Privilege Vulnerability | Important |
| CVE-2024-43520 | Windows Kernel Denial of Service Vulnerability | Important |
| CVE-2024-43527 | Windows Kernel Elevation of Privilege Vulnerability | Important |
| CVE-2024-43570 | Windows Kernel Elevation of Privilege Vulnerability | Important |
| CVE-2024-37979 | Windows Kernel Elevation of Privilege Vulnerability | Important |
| CVE-2024-43554 | Windows Kernel-Mode Driver Information Disclosure Vulnerability | Important |
| CVE-2024-43535 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important |
| CVE-2024-43522 | Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability | Important |
| CVE-2024-43555 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-43540 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-43536 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Important |
| CVE-2024-43538 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-43525 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Important |
| CVE-2024-43559 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-43561 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-43558 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-43542 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-43557 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-43526 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Important |
| CVE-2024-43543 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Important |
| CVE-2024-43523 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Important |
| CVE-2024-43524 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Important |
| CVE-2024-43537 | Windows Mobile Broadband Driver Denial of Service Vulnerability | Important |
| CVE-2024-38124 | Windows Netlogon Elevation of Privilege Vulnerability | Important |
| CVE-2024-43562 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Important |
| CVE-2024-43565 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Important |
| CVE-2024-43553 | NT OS Kernel Elevation of Privilege Vulnerability | Important |
| CVE-2024-43514 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | Important |
| CVE-2024-43545 | Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability | Important |
| CVE-2024-43529 | Windows Print Spooler Elevation of Privilege Vulnerability | Important |
| CVE-2024-38262 | Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability | Important |
| CVE-2024-43456 | Windows Remote Desktop Services Tampering Vulnerability | Important |
| CVE-2024-43500 | Windows Resilient File System (ReFS) Information Disclosure Vulnerability | Important |
| CVE-2024-43592 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43589 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-38212 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43593 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-38261 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43611 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43453 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-38265 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43607 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43608 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43564 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| CVE-2024-43584 | Windows Scripting Engine Security Feature Bypass Vulnerability | Important |
| CVE-2024-43550 | Windows Secure Channel Spoofing Vulnerability | Important |
| CVE-2024-43516 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability | Important |
| CVE-2024-43528 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability | Important |
| CVE-2024-43552 | Windows Shell Remote Code Execution Vulnerability | Important |
| CVE-2024-43512 | Windows Standards-Based Storage Management Service Denial of Service Vulnerability | Important |
| CVE-2024-43551 | Windows Storage Elevation of Privilege Vulnerability | Important |
| CVE-2024-43560 | Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability | Important |
| CVE-2024-43518 | Windows Telephony Server Remote Code Execution Vulnerability | Important |
| CVE-2024-43583 | Winlogon Elevation of Privilege Vulnerability | Important |
| CVE-2024-43573 | Windows MSHTML Platform Spoofing Vulnerability | Moderate |


