9.7 C
New York
Monday, March 10, 2025

Microsoft August 2024 Patch Tuesday fixes 9 zero-days, 6 exploited

Must read

Nowadays is Microsoft’s August 2024 Patch Tuesday, which incorporates safety updates for 89 flaws, together with six actively exploited and 3 publicly disclosed zero-days. Microsoft continues to be running on an replace for a 10th publicly disclosed zero-day.

This Patch Tuesday mounted 8 important vulnerabilities, that have been a mix of elevation of privileges, far off code execution, and knowledge disclosure.

The selection of insects in every vulnerability class is indexed beneath:

  • 36 Elevation of Privilege Vulnerabilities
  • 4 Safety Characteristic Bypass Vulnerabilities
  • 28 Far flung Code Execution Vulnerabilities
  • 8 Knowledge Disclosure Vulnerabilities
  • 6 Denial of Provider Vulnerabilities
  • 7 Spoofing Vulnerabilities

The selection of insects indexed above don’t come with Microsoft Edge flaws that have been disclosed previous this month.

- Advertisement -

To be told extra in regards to the non-security updates launched as of late, you’ll be able to assessment our devoted articles at the new Home windows 11 KB5041585 replace  and Home windows 10 KB5041580 replace.

Generally tend zero-days disclosed

This month’s Patch Tuesday fixes six actively exploited and 3 different publicly disclosed zero-day vulnerabilities. Every other publicly disclosed zero-day stays unfixed right now, however Microsoft is operating on an replace.

Microsoft classifies a zero-day flaw as one this is publicly disclosed or actively exploited whilst no reliable repair is to be had.

The six actively exploited zero-day vulnerabilities in as of late’s updates are:

CVE-2024-38178 – Scripting Engine Reminiscence Corruption Vulnerability

Microsoft says that the assault calls for an authenticated consumer to click on a hyperlink to ensure that an unauthenticated attacker to begin far off code execution.

The hyperlink will have to be clicked in Microsoft Edge in Web Explorer mode, making it a tough flaw to take advantage of.

- Advertisement -

Alternatively, even with those pre-requisites, the South Korean Nationwide Cyber Safety Middle(NCSC) and AhnLab disclosed the flaw as being exploited in assaults.

CVE-2024-38193 – Home windows Ancillary Serve as Driving force for WinSock Elevation of Privilege Vulnerability

This vulnerability lets in assaults to realize SYSTEM privileges on Home windows methods.

The flaw used to be came upon via Luigino Camastra and Milánek with Gen Virtual however Microsoft didn’t proportion any main points on the way it used to be disclosed.

CVE-2024-38213 – Home windows Mark of the Internet Safety Characteristic Bypass Vulnerability

This vulnerability lets in attackers to create information that bypass Home windows Mark of the Internet safety indicators.

This safety characteristic has been matter to a lot of bypasses over the 12 months as it’s a beautiful goal for danger actors who habits phishing campaigns.

Microsoft says the flaw used to be came upon via Peter Girnus of Pattern Micro’s 0 Day Initiative however didn’t proportion how it’s exploited in assaults.

- Advertisement -

CVE-2024-38106 – Home windows Kernel Elevation of Privilege Vulnerability

Microsoft mounted a Home windows Kernel elevation of privileges flaw that provides SYSTEM privileges.

“A hit exploitation of this vulnerability calls for an attacker to win a race situation,” explains Microsoft’s advisory.

“An attacker who effectively exploited this vulnerability may just achieve SYSTEM privileges,” persisted Microsoft.

Microsoft has now not shared who disclosed the flaw and the way it used to be exploited.

CVE-2024-38107 – Home windows Energy Dependency Coordinator Elevation of Privilege Vulnerability

Microsoft mounted a flaw that provides attackers SYSTEM privileges at the Home windows instrument.

Microsoft has now not shared who disclosed the flaw and the way it used to be exploited.

CVE-2024-38189 – Microsoft Undertaking Far flung Code Execution Vulnerability

Microsoft mounted a Microsoft Undertaking far off code execution vulnerability that calls for safety features to be disabled for exploitation.

“Exploitation calls for the sufferer to open a malicious Microsoft Place of business Undertaking document on a gadget the place the Block macros from operating in Place of business information from the Web coverage is disabled and VBA Macro Notification Settings aren’t enabled permitting the attacker to accomplish far off code execution,” provide an explanation for the advisory.

Microsoft says that the attackers would want to trick a person into opening the malicious document, similar to thru phishing assaults or via luring customers to internet sites internet hosting the document.

Microsoft has now not disclosed who came upon the vulnerability or the way it used to be exploited in assaults.

The 4 publicly disclosed vulnerabilities are:

CVE-2024-38199 – Home windows Line Printer Daemon (LPD) Provider Far flung Code Execution Vulnerability

Microsoft has mounted a far off code execution vulnerability within the Home windows Line Printer Daemon.

“An unauthenticated attacker may just ship a specifically crafted print process to a shared susceptible Home windows Line Printer Daemon (LPD) provider throughout a community. A hit exploitation may just lead to far off code execution at the server,” explains Microsoft’s advisory.

See also  Apple Glasses: The whole lot We Know So Some distance

This vulnerability is indexed as publicly disclosed however the one who disclosed it needed to stay Nameless.

CVE-2024-21302 – Home windows Safe Kernel Mode Elevation of Privilege Vulnerability

This flaw used to be disclosed via SafeBreach safety researcher Alon Leviev as a part of a Home windows Downdate downgrade assault communicate at Black Hat 2024.

The Home windows Downdate assault unpatches absolutely up to date Home windows 10, Home windows 11, and Home windows Server methods to reintroduce previous vulnerabilities the usage of specifically crafted updates.

This flaw allowed the attackers to realize increased privileges to put in the malicious updates.

CVE-2024-38200 – Microsoft Place of business Spoofing Vulnerability

Microsoft mounted a Microsoft Place of business vulnerability that exposes NTLM hashes as disclosed within the “NTLM – The remaining experience” Defcon communicate.

Attackers may just exploit the flaw via tricking somebody into opening a malicious document, which might then pressure Place of business to make an outbound connect with a far off proportion the place attackers may just thieve despatched NTLM hashes.

The flaw used to be came upon via Jim Rush with PrivSec and used to be already mounted by means of Microsoft Place of business Characteristic Flighting on 7/30/2024.

CVE-2024-38202 – Home windows Replace Stack Elevation of Privilege Vulnerability

This flaw used to be additionally a part of the Home windows Downdate downgrade assault communicate at Black Hat 2024.

Microsoft is growing a safety replace to mitigate this danger, however it’s not but to be had.

Fresh updates from different firms

Different distributors who launched updates or advisories in August 2024 come with:

  • 0.0.0.0 Day flaw lets in malicious internet sites to circumvent browser safety features and get right of entry to products and services on a neighborhood community.
  • Android August safety updates fixes actively exploited RCE.
  • CISA warned of Cisco Good Set up (SMI) characteristic being abused in assaults.
  • Cisco warns of important RCE flaws in end-of-life Small Trade SPA 300 and SPA 500 sequence IP telephones.
  • New GhostWrite flaw  GhostWrite vulnerability we could unprivileged attackers learn and write to the pc’s reminiscence on T-Head XuanTie C910 and C920 RISC-V CPUs and keep an eye on peripheral gadgets.
  • Ivanti releases safety replace for important vTM auth bypass with public exploit.
  • Microsoft warned about new Place of business flaw tracked as CVE-2024-38200 that leaks NTLM hashes.
  • New SinkClose flaw we could attackers achieve Ring -2 privileges on AMD CPUs.
  • New Linux SLUBStick flaw converts a restricted heap vulnerability into an arbitrary reminiscence read-and-write capacity.
  • New Home windows DownDate flaw we could attackers downgrade the running gadget to reintroduce vulnerabilities.

The August 2024 Patch Tuesday Safety Updates

Beneath is your complete listing of resolved vulnerabilities within the August 2024 Patch Tuesday updates.

To get right of entry to the total description of every vulnerability and the methods it impacts, you’ll be able to view the complete document right here.

Tag CVE ID CVE Name Severity
.NET and Visible Studio CVE-2024-38168 .NET and Visible Studio Denial of Provider Vulnerability Necessary
.NET and Visible Studio CVE-2024-38167 .NET and Visible Studio Knowledge Disclosure Vulnerability Necessary
Azure Attached System Agent CVE-2024-38162 Azure Attached System Agent Elevation of Privilege Vulnerability Necessary
Azure Attached System Agent CVE-2024-38098 Azure Attached System Agent Elevation of Privilege Vulnerability Necessary
Azure CycleCloud CVE-2024-38195 Azure CycleCloud Far flung Code Execution Vulnerability Necessary
Azure Well being Bot CVE-2024-38109 Azure Well being Bot Elevation of Privilege Vulnerability Crucial
Azure IoT SDK CVE-2024-38158 Azure IoT SDK Far flung Code Execution Vulnerability Necessary
Azure IoT SDK CVE-2024-38157 Azure IoT SDK Far flung Code Execution Vulnerability Necessary
Azure Stack CVE-2024-38108 Azure Stack Hub Spoofing Vulnerability Necessary
Azure Stack CVE-2024-38201 Azure Stack Hub Elevation of Privilege Vulnerability Necessary
Line Printer Daemon Provider (LPD) CVE-2024-38199 Home windows Line Printer Daemon (LPD) Provider Far flung Code Execution Vulnerability Necessary
Microsoft Bluetooth Driving force CVE-2024-38123 Home windows Bluetooth Driving force Knowledge Disclosure Vulnerability Necessary
Microsoft Copilot Studio CVE-2024-38206 Microsoft Copilot Studio Knowledge Disclosure Vulnerability Crucial
Microsoft Dynamics CVE-2024-38166 Microsoft Dynamics 365 Move-site Scripting Vulnerability Crucial
Microsoft Dynamics CVE-2024-38211 Microsoft Dynamics 365 (on-premises) Move-site Scripting Vulnerability Necessary
Microsoft Edge (Chromium-based) CVE-2024-7256 Chromium: CVE-2024-7256 Inadequate information validation in Break of day Unknown
Microsoft Edge (Chromium-based) CVE-2024-7536 Chromium: CVE-2024-7550 Kind Confusion in V8 Unknown
Microsoft Edge (Chromium-based) CVE-2024-6990 Chromium: CVE-2024-6990 Uninitialized Use in Break of day Unknown
Microsoft Edge (Chromium-based) CVE-2024-7255 Chromium: CVE-2024-7255 Out of bounds learn in WebTransport Unknown
Microsoft Edge (Chromium-based) CVE-2024-7534 Chromium: CVE-2024-7535 Beside the point implementation in V8 Unknown
Microsoft Edge (Chromium-based) CVE-2024-7532 Chromium: CVE-2024-7533 Use after loose in Sharing Unknown
Microsoft Edge (Chromium-based) CVE-2024-7550 Chromium: CVE-2024-7532 Out of bounds reminiscence get right of entry to in ANGLE Unknown
Microsoft Edge (Chromium-based) CVE-2024-7535 Chromium: CVE-2024-7536 Use after loose in WebAudio Unknown
Microsoft Edge (Chromium-based) CVE-2024-7533 Chromium: CVE-2024-7534 Heap buffer overflow in Structure Unknown
Microsoft Edge (Chromium-based) CVE-2024-38218 Microsoft Edge (HTML-based) Reminiscence Corruption Vulnerability Necessary
Microsoft Edge (Chromium-based) CVE-2024-38219 Microsoft Edge (Chromium-based) Far flung Code Execution Vulnerability Reasonable
Microsoft Edge (Chromium-based) CVE-2024-38222 Microsoft Edge (Chromium-based) Knowledge Disclosure Vulnerability Unknown
Microsoft Native Safety Authority Server (lsasrv) CVE-2024-38118 Microsoft Native Safety Authority (LSA) Server Knowledge Disclosure Vulnerability Necessary
Microsoft Native Safety Authority Server (lsasrv) CVE-2024-38122 Microsoft Native Safety Authority (LSA) Server Knowledge Disclosure Vulnerability Necessary
Microsoft Place of business CVE-2024-38200 Microsoft Place of business Spoofing Vulnerability Necessary
Microsoft Place of business CVE-2024-38084 Microsoft OfficePlus Elevation of Privilege Vulnerability Necessary
Microsoft Place of business Excel CVE-2024-38172 Microsoft Excel Far flung Code Execution Vulnerability Necessary
Microsoft Place of business Excel CVE-2024-38170 Microsoft Excel Far flung Code Execution Vulnerability Necessary
Microsoft Place of business Outlook CVE-2024-38173 Microsoft Outlook Far flung Code Execution Vulnerability Necessary
Microsoft Place of business PowerPoint CVE-2024-38171 Microsoft PowerPoint Far flung Code Execution Vulnerability Necessary
Microsoft Place of business Undertaking CVE-2024-38189 Microsoft Undertaking Far flung Code Execution Vulnerability Necessary
Microsoft Place of business Visio CVE-2024-38169 Microsoft Place of business Visio Far flung Code Execution Vulnerability Necessary
Microsoft Streaming Provider CVE-2024-38134 Kernel Streaming WOW Thunk Provider Driving force Elevation of Privilege Vulnerability Necessary
Microsoft Streaming Provider CVE-2024-38144 Kernel Streaming WOW Thunk Provider Driving force Elevation of Privilege Vulnerability Necessary
Microsoft Streaming Provider CVE-2024-38125 Kernel Streaming WOW Thunk Provider Driving force Elevation of Privilege Vulnerability Necessary
Microsoft Groups CVE-2024-38197 Microsoft Groups for iOS Spoofing Vulnerability Necessary
Microsoft WDAC OLE DB supplier for SQL CVE-2024-38152 Home windows OLE Far flung Code Execution Vulnerability Necessary
Microsoft Home windows DNS CVE-2024-37968 Home windows DNS Spoofing Vulnerability Necessary
Dependable Multicast Shipping Driving force (RMCAST) CVE-2024-38140 Home windows Dependable Multicast Shipping Driving force (RMCAST) Far flung Code Execution Vulnerability Crucial
Home windows Ancillary Serve as Driving force for WinSock CVE-2024-38141 Home windows Ancillary Serve as Driving force for WinSock Elevation of Privilege Vulnerability Necessary
Home windows Ancillary Serve as Driving force for WinSock CVE-2024-38193 Home windows Ancillary Serve as Driving force for WinSock Elevation of Privilege Vulnerability Necessary
Home windows App Installer CVE-2024-38177 Home windows App Installer Spoofing Vulnerability Necessary
Home windows Clipboard Digital Channel Extension CVE-2024-38131 Clipboard Digital Channel Extension Far flung Code Execution Vulnerability Necessary
Home windows Cloud Recordsdata Mini Clear out Driving force CVE-2024-38215 Home windows Cloud Recordsdata Mini Clear out Driving force Elevation of Privilege Vulnerability Necessary
Home windows Not unusual Log Record Device Driving force CVE-2024-38196 Home windows Not unusual Log Record Device Driving force Elevation of Privilege Vulnerability Necessary
Home windows Compressed Folder CVE-2024-38165 Home windows Compressed Folder Tampering Vulnerability Necessary
Home windows Deployment Services and products CVE-2024-38138 Home windows Deployment Services and products Far flung Code Execution Vulnerability Necessary
Home windows DWM Core Library CVE-2024-38150 Home windows DWM Core Library Elevation of Privilege Vulnerability Necessary
Home windows DWM Core Library CVE-2024-38147 Microsoft DWM Core Library Elevation of Privilege Vulnerability Necessary
Home windows Preliminary System Configuration CVE-2024-38223 Home windows Preliminary System Configuration Elevation of Privilege Vulnerability Necessary
Home windows IP Routing Control Snapin CVE-2024-38114 Home windows IP Routing Control Snapin Far flung Code Execution Vulnerability Necessary
Home windows IP Routing Control Snapin CVE-2024-38116 Home windows IP Routing Control Snapin Far flung Code Execution Vulnerability Necessary
Home windows IP Routing Control Snapin CVE-2024-38115 Home windows IP Routing Control Snapin Far flung Code Execution Vulnerability Necessary
Home windows Kerberos CVE-2024-29995 Home windows Kerberos Elevation of Privilege Vulnerability Necessary
Home windows Kernel CVE-2024-38151 Home windows Kernel Knowledge Disclosure Vulnerability Necessary
Home windows Kernel CVE-2024-38133 Home windows Kernel Elevation of Privilege Vulnerability Necessary
Home windows Kernel CVE-2024-38127 Home windows Hyper-V Elevation of Privilege Vulnerability Necessary
Home windows Kernel CVE-2024-38153 Home windows Kernel Elevation of Privilege Vulnerability Necessary
Home windows Kernel CVE-2024-38106 Home windows Kernel Elevation of Privilege Vulnerability Necessary
Home windows Kernel-Mode Drivers CVE-2024-38187 Home windows Kernel-Mode Driving force Elevation of Privilege Vulnerability Necessary
Home windows Kernel-Mode Drivers CVE-2024-38191 Kernel Streaming Provider Driving force Elevation of Privilege Vulnerability Necessary
Home windows Kernel-Mode Drivers CVE-2024-38184 Home windows Kernel-Mode Driving force Elevation of Privilege Vulnerability Necessary
Home windows Kernel-Mode Drivers CVE-2024-38186 Home windows Kernel-Mode Driving force Elevation of Privilege Vulnerability Necessary
Home windows Kernel-Mode Drivers CVE-2024-38185 Home windows Kernel-Mode Driving force Elevation of Privilege Vulnerability Necessary
Home windows Layer-2 Bridge Community Driving force CVE-2024-38146 Home windows Layer-2 Bridge Community Driving force Denial of Provider Vulnerability Necessary
Home windows Layer-2 Bridge Community Driving force CVE-2024-38145 Home windows Layer-2 Bridge Community Driving force Denial of Provider Vulnerability Necessary
Home windows Mark of the Internet (MOTW) CVE-2024-38213 Home windows Mark of the Internet Safety Characteristic Bypass Vulnerability Reasonable
Home windows Cell Broadband CVE-2024-38161 Home windows Cell Broadband Driving force Far flung Code Execution Vulnerability Necessary
Home windows Community Deal with Translation (NAT) CVE-2024-38132 Home windows Community Deal with Translation (NAT) Denial of Provider Vulnerability Necessary
Home windows Community Deal with Translation (NAT) CVE-2024-38126 Home windows Community Deal with Translation (NAT) Denial of Provider Vulnerability Necessary
Home windows Community Virtualization CVE-2024-38160 Home windows Community Virtualization Far flung Code Execution Vulnerability Crucial
Home windows Community Virtualization CVE-2024-38159 Home windows Community Virtualization Far flung Code Execution Vulnerability Crucial
Home windows NT OS Kernel CVE-2024-38135 Home windows Resilient Record Device (ReFS) Elevation of Privilege Vulnerability Necessary
Home windows NTFS CVE-2024-38117 NTFS Elevation of Privilege Vulnerability Necessary
Home windows Energy Dependency Coordinator CVE-2024-38107 Home windows Energy Dependency Coordinator Elevation of Privilege Vulnerability Necessary
Home windows Print Spooler Parts CVE-2024-38198 Home windows Print Spooler Elevation of Privilege Vulnerability Necessary
Home windows Useful resource Supervisor CVE-2024-38137 Home windows Useful resource Supervisor PSM Provider Extension Elevation of Privilege Vulnerability Necessary
Home windows Useful resource Supervisor CVE-2024-38136 Home windows Useful resource Supervisor PSM Provider Extension Elevation of Privilege Vulnerability Necessary
Home windows Routing and Far flung Get entry to Provider (RRAS) CVE-2024-38130 Home windows Routing and Far flung Get entry to Provider (RRAS) Far flung Code Execution Vulnerability Necessary
Home windows Routing and Far flung Get entry to Provider (RRAS) CVE-2024-38128 Home windows Routing and Far flung Get entry to Provider (RRAS) Far flung Code Execution Vulnerability Necessary
Home windows Routing and Far flung Get entry to Provider (RRAS) CVE-2024-38154 Home windows Routing and Far flung Get entry to Provider (RRAS) Far flung Code Execution Vulnerability Necessary
Home windows Routing and Far flung Get entry to Provider (RRAS) CVE-2024-38121 Home windows Routing and Far flung Get entry to Provider (RRAS) Far flung Code Execution Vulnerability Necessary
Home windows Routing and Far flung Get entry to Provider (RRAS) CVE-2024-38214 Home windows Routing and Far flung Get entry to Provider (RRAS) Knowledge Disclosure Vulnerability Necessary
Home windows Routing and Far flung Get entry to Provider (RRAS) CVE-2024-38120 Home windows Routing and Far flung Get entry to Provider (RRAS) Far flung Code Execution Vulnerability Necessary
Home windows Scripting CVE-2024-38178 Scripting Engine Reminiscence Corruption Vulnerability Necessary
Home windows Safe Boot CVE-2022-3775 Redhat: CVE-2022-3775 grub2 – Heap founded out-of-bounds write when rendering sure Unicode sequences Crucial
Home windows Safe Boot CVE-2023-40547 Redhat: CVE-2023-40547 Shim – RCE in HTTP boot improve would possibly result in safe boot bypass Crucial
Home windows Safe Boot CVE-2022-2601 Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can result in out-of-bound write and imaginable safe boot bypass Necessary
Home windows Safe Kernel Mode CVE-2024-21302 Home windows Safe Kernel Mode Elevation of Privilege Vulnerability Necessary
Home windows Safe Kernel Mode CVE-2024-38142 Home windows Safe Kernel Mode Elevation of Privilege Vulnerability Necessary
Home windows Safety Middle CVE-2024-38155 Safety Middle Dealer Knowledge Disclosure Vulnerability Necessary
Home windows SmartScreen CVE-2024-38180 Home windows SmartScreen Safety Characteristic Bypass Vulnerability Necessary
Home windows TCP/IP CVE-2024-38063 Home windows TCP/IP Far flung Code Execution Vulnerability Crucial
Home windows Shipping Safety Layer (TLS) CVE-2024-38148 Home windows Safe Channel Denial of Provider Vulnerability Necessary
Home windows Replace Stack CVE-2024-38202 Home windows Replace Stack Elevation of Privilege Vulnerability Necessary
Home windows Replace Stack CVE-2024-38163 Home windows Replace Stack Elevation of Privilege Vulnerability Necessary
Home windows WLAN Auto Config Provider CVE-2024-38143 Home windows WLAN AutoConfig Provider Elevation of Privilege Vulnerability Necessary
See also  Even State-Of-The-Artwork Language Fashions Battle to Perceive Temporal Good judgment

Related News

- Advertisement -
- Advertisement -

Latest News

- Advertisement -