At present is Microsoft’s Might 2024 Patch Tuesday, which incorporates safety updates for 61 flaws and three actively exploited or publicly disclosed zero days.
This Patch Tuesday solely fixes one crucial vulnerability, a Microsoft SharePoint Server Distant Code Execution Vulnerability.
The variety of bugs in every vulnerability class is listed under:
- 17 Elevation of Privilege Vulnerabilities
- 2 Safety Characteristic Bypass Vulnerabilities
- 27 Distant Code Execution Vulnerabilities
- 7 Data Disclosure Vulnerabilities
- 3 Denial of Service Vulnerabilities
- 4 Spoofing Vulnerabilities
The entire rely of 61 flaws doesn’t embrace 2 Microsoft Edge flaws fastened on Might 2nd and 4 fastened on Might tenth.
To study extra in regards to the non-security updates launched as we speak, you possibly can evaluate our devoted articles on the brand new Home windows 11 KB5037771 cumulative replace and the Home windows 10 KB5037768 replace.
Three zero-days fastened
This month’s Patch Tuesday fixes two actively exploited and one publicly disclosed zero-day vulnerabilities.
Microsoft classifies a zero-day as a flaw publicly disclosed or actively exploited with no official repair out there.
The 2 actively exploited zero-day vulnerabilities in as we speak’s updates are:
CVE-2024-30040 – Home windows MSHTML Platform Safety Characteristic Bypass Vulnerability
Microsoft has fastened an actively exploited bypass to OLE mitigations, which have been added to Microsoft 365 and Microsoft Workplace to guard customers from susceptible COM/OLE controls.
“An attacker must persuade the person to load a malicious file onto a susceptible system, sometimes by the use of an enticement in an E mail or Immediate Messenger message, after which persuade the person to control the specifically crafted file, however not essentially click on or open the malicious file,” explains Microsoft.
“An unauthenticated attacker who efficiently exploited this vulnerability may acquire code execution by means of convincing a person to open a malicious doc at which level the attacker may execute arbitrary code within the context of the person,” continued Microsoft.
It just isn’t recognized how the flaw was abused in assaults or who found it.
CVE-2024-30051 – Home windows DWM Core Library Elevation of Privilege Vulnerability
Microsoft has fastened an actively exploited Home windows DWM Core Library flaw that gives SYSTEM privileges.
“An attacker who efficiently exploited this vulnerability may acquire SYSTEM privileges,” explains Microsoft.
Kaspersky states that current Qakbot malware phishing assaults used malicious paperwork to take advantage of the flaw and acquire SYSTEM privileges on Home windows units.
Microsoft stated the flaw was disclosed by the next researchers: Mert Degirmenci and Boris Larin with Kaspersky, Quan Jin with DBAPPSecurity WeBin Lab Guoxian Zhong with DBAPPSecurity WeBin Lab, and Vlad Stolyarov and Benoit Sevens of Google Risk Evaluation Group Bryce Abdo and Adam Brunner of Google Mandiant.
Microsoft states that the CVE-2024-30051 was additionally publicly disclosed, nevertheless it’s unclear the place that was accomplished. As well as, Microsoft says a denial of service flaw in Microsoft Visible Studio tracked as CVE-2024-30046 was publicly disclosed as properly.
Current updates from different corporations
Different distributors who launched updates or advisories in Might 2024 embrace:
Sadly, we are going to not be linking to SAP’s Patch Tuesday safety updates as they’ve positioned them behind a buyer login.
The Might 2024 Patch Tuesday Safety Updates
Under is the entire listing of resolved vulnerabilities within the Might 2024 Patch Tuesday updates.
To entry the complete description of every vulnerability and the methods it impacts, you possibly can view the full report right here.
Tag | CVE ID | CVE Title | Severity |
---|---|---|---|
.NET and Visible Studio | CVE-2024-30045 | .NET and Visible Studio Distant Code Execution Vulnerability | Essential |
Azure Migrate | CVE-2024-30053 | Azure Migrate Cross-Web site Scripting Vulnerability | Essential |
Microsoft Bing | CVE-2024-30041 | Microsoft Bing Search Spoofing Vulnerability | Essential |
Microsoft Brokering File System | CVE-2024-30007 | Microsoft Brokering File System Elevation of Privilege Vulnerability | Essential |
Microsoft Dynamics 365 Buyer Insights | CVE-2024-30048 | Dynamics 365 Buyer Insights Spoofing Vulnerability | Essential |
Microsoft Dynamics 365 Buyer Insights | CVE-2024-30047 | Dynamics 365 Buyer Insights Spoofing Vulnerability | Essential |
Microsoft Edge (Chromium-based) | CVE-2024-4558 | Chromium: CVE-2024-4558 Use after free in ANGLE | Unknown |
Microsoft Edge (Chromium-based) | CVE-2024-4331 | Chromium: CVE-2024-4331 Use after free in Image In Image | Unknown |
Microsoft Edge (Chromium-based) | CVE-2024-4671 | Chromium: CVE-2024-4671 Use after free in Visuals | Unknown |
Microsoft Edge (Chromium-based) | CVE-2024-30055 | Microsoft Edge (Chromium-based) Spoofing Vulnerability | Low |
Microsoft Edge (Chromium-based) | CVE-2024-4368 | Chromium: CVE-2024-4368 Use after free in Daybreak | Unknown |
Microsoft Edge (Chromium-based) | CVE-2024-4559 | Chromium: CVE-2024-4559 Heap buffer overflow in WebAudio | Unknown |
Microsoft Intune | CVE-2024-30059 | Microsoft Intune for Android Cell Software Administration Tampering Vulnerability | Essential |
Microsoft Workplace Excel | CVE-2024-30042 | Microsoft Excel Distant Code Execution Vulnerability | Essential |
Microsoft Workplace SharePoint | CVE-2024-30044 | Microsoft SharePoint Server Distant Code Execution Vulnerability | Vital |
Microsoft Workplace SharePoint | CVE-2024-30043 | Microsoft SharePoint Server Data Disclosure Vulnerability | Essential |
Microsoft WDAC OLE DB supplier for SQL | CVE-2024-30006 | Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability | Essential |
Microsoft Home windows SCSI Class System File | CVE-2024-29994 | Microsoft Home windows SCSI Class System File Elevation of Privilege Vulnerability | Essential |
Microsoft Home windows Search Element | CVE-2024-30033 | Home windows Search Service Elevation of Privilege Vulnerability | Essential |
Energy BI | CVE-2024-30054 | Microsoft Energy BI Shopper JavaScript SDK Data Disclosure Vulnerability | Essential |
Visible Studio | CVE-2024-30046 | Visible Studio Denial of Service Vulnerability | Essential |
Visible Studio | CVE-2024-32004 | GitHub: CVE-2024-32004 Distant Code Execution whereas cloning special-crafted native repositories | Essential |
Visible Studio | CVE-2024-32002 | CVE-2024-32002 Recursive clones on case-insensitive filesystems that help symlinks are prone to Distant Code Execution | Essential |
Home windows Cloud Recordsdata Mini Filter Driver | CVE-2024-30034 | Home windows Cloud Recordsdata Mini Filter Driver Data Disclosure Vulnerability | Essential |
Home windows CNG Key Isolation Service | CVE-2024-30031 | Home windows CNG Key Isolation Service Elevation of Privilege Vulnerability | Essential |
Home windows Frequent Log File System Driver | CVE-2024-29996 | Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability | Essential |
Home windows Frequent Log File System Driver | CVE-2024-30037 | Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability | Essential |
Home windows Frequent Log File System Driver | CVE-2024-30025 | Home windows Frequent Log File System Driver Elevation of Privilege Vulnerability | Essential |
Home windows Cryptographic Companies | CVE-2024-30020 | Home windows Cryptographic Companies Distant Code Execution Vulnerability | Essential |
Home windows Cryptographic Companies | CVE-2024-30016 | Home windows Cryptographic Companies Data Disclosure Vulnerability | Essential |
Home windows Deployment Companies | CVE-2024-30036 | Home windows Deployment Companies Data Disclosure Vulnerability | Essential |
Home windows DHCP Server | CVE-2024-30019 | DHCP Server Service Denial of Service Vulnerability | Essential |
Home windows DWM Core Library | CVE-2024-30008 | Home windows DWM Core Library Data Disclosure Vulnerability | Essential |
Home windows DWM Core Library | CVE-2024-30051 | Home windows DWM Core Library Elevation of Privilege Vulnerability | Essential |
Home windows DWM Core Library | CVE-2024-30035 | Home windows DWM Core Library Elevation of Privilege Vulnerability | Essential |
Home windows DWM Core Library | CVE-2024-30032 | Home windows DWM Core Library Elevation of Privilege Vulnerability | Essential |
Home windows Hyper-V | CVE-2024-30011 | Home windows Hyper-V Denial of Service Vulnerability | Essential |
Home windows Hyper-V | CVE-2024-30017 | Home windows Hyper-V Distant Code Execution Vulnerability | Essential |
Home windows Hyper-V | CVE-2024-30010 | Home windows Hyper-V Distant Code Execution Vulnerability | Essential |
Home windows Kernel | CVE-2024-30018 | Home windows Kernel Elevation of Privilege Vulnerability | Essential |
Home windows Mark of the Internet (MOTW) | CVE-2024-30050 | Home windows Mark of the Internet Safety Characteristic Bypass Vulnerability | Average |
Home windows Cell Broadband | CVE-2024-30002 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-29997 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-30003 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-30012 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-29999 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-29998 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-30000 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-30005 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-30004 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-30021 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows Cell Broadband | CVE-2024-30001 | Home windows Cell Broadband Driver Distant Code Execution Vulnerability | Essential |
Home windows MSHTML Platform | CVE-2024-30040 | Home windows MSHTML Platform Safety Characteristic Bypass Vulnerability | Essential |
Home windows NTFS | CVE-2024-30027 | NTFS Elevation of Privilege Vulnerability | Essential |
Home windows Distant Entry Connection Supervisor | CVE-2024-30039 | Home windows Distant Entry Connection Supervisor Data Disclosure Vulnerability | Essential |
Home windows Routing and Distant Entry Service (RRAS) | CVE-2024-30009 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
Home windows Routing and Distant Entry Service (RRAS) | CVE-2024-30024 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
Home windows Routing and Distant Entry Service (RRAS) | CVE-2024-30015 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
Home windows Routing and Distant Entry Service (RRAS) | CVE-2024-30029 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
Home windows Routing and Distant Entry Service (RRAS) | CVE-2024-30023 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
Home windows Routing and Distant Entry Service (RRAS) | CVE-2024-30014 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
Home windows Routing and Distant Entry Service (RRAS) | CVE-2024-30022 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability | Essential |
Home windows Process Scheduler | CVE-2024-26238 | Microsoft PLUGScheduler Scheduled Process Elevation of Privilege Vulnerability | Essential |
Home windows Win32K – GRFX | CVE-2024-30030 | Win32k Elevation of Privilege Vulnerability | Essential |
Home windows Win32K – ICOMP | CVE-2024-30038 | Win32k Elevation of Privilege Vulnerability | Essential |
Home windows Win32K – ICOMP | CVE-2024-30049 | Home windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability | Essential |
Home windows Win32K – ICOMP | CVE-2024-30028 | Win32k Elevation of Privilege Vulnerability | Essential |