A tumultuous, titanic Patch Tuesday as Microsoft makes some adjustments – Sophos News

0
692
A tumultuous, titanic Patch Tuesday as Microsoft makes some adjustments – Sophos News


Several months of relative calm are over for Windows directors, as Microsoft on Tuesday launched 147 patches affecting ten product households. Windows takes the lion’s share of patches with 90, with 38 for SQL Server (together with ten shared with Visual Studio). The relaxation are unfold amongst .NET, 365, Azure, Defender for IoT, Office, Outlook, and SharePoint. There are three critical-severity points, all affecting Defender for IoT.

At patch time, three points, all important-severity faults affecting Windows, are recognized to be below lively exploit within the wild. One (CVE-2024-26234, a driver-related problem reported to Microsoft by Sophos) is publicly disclosed, as we’ll focus on beneath. Eleven extra important-severity vulnerabilities in Windows are by the corporate’s estimation extra prone to be exploited within the subsequent 30 days. Six of the problems addressed are amenable to detection by Sophos protections, and we embrace data on these in a desk beneath.

In addition to those patches, the discharge contains advisory data on 5 patches associated to the Edge browser and 5 from Intel, Lenovo, and Red Hat; the usually scheduled servicing stack updates are additionally included in advisory materials this month. We don’t embrace advisories within the CVE counts and graphics beneath, however we offer data on all of them in an appendix on the finish of the article. We are as standard together with on the finish of this submit three different appendices itemizing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product household.

By the numbers

  • Total Microsoft CVEs: 147
  • Total Edge / Chrome advisory points lined in replace: 5
  • Total non-Edge, non-Microsoft advisory points overed in replace: 5
  • Publicly disclosed: 1
  • Currently exploited: 3
  • Severity
    • Critical: 3
    • Important: 142
    • Moderate: 2
  • Impact
    • Remote Code Execution: 67
    • Elevation of Privilege: 31
    • Security Feature Bypass: 27
    • Information Disclosure: 12
    • Denial of Service: 7
    • Spoofing: 3

A bar chart showing the severity of April 2024 Microsoft patches, sorted by impact; information is replicated in text

Figure 1: RCEs got here roaring to the forefront this month, however Security Feature Bypass makes a formidable exhibiting (extra on that in a bit)

Products

  • Windows: 90
  • SQL Server: 38 (together with 10 shared with Visual Studio)
  • Visual Studio: 11 (together with 10 shared with SQL Server and one shared with .NET)
  • Azure: 9
  • Defender for IoT: 6
  • .NET: 1 (shared with Visual Studio)
  • 365: 1 (shared with Office)
  • Office: 1 (shared with 365)
  • Outlook: 1
  • SharePoint: 1

A bar chart showing the severity of April 2024 Microsoft patches, sorted by product family; information is replicated in text

Figure 2: Windows accounts for slightly below two-thirds of the April 2024 patches, with 9 different product households additionally within the combine (however 5 of these receiving only one patch)

Notable April updates and themes

In addition to the problems mentioned above, a couple of particular objects benefit consideration.

Startup Issues Stack Up

Secure Boot Security Feature Bypass Vulnerability – 24 patches
BitLocker Security Feature Bypass Vulnerability – 1 patch
Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell – 1 patch
Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi – 1 patch

Secure Boot and BitLocker are having an fascinating month. All 25 Microsoft patches are important-severity points. Microsoft says that none of them are at present below lively exploitation and that they imagine exploitation is much less seemingly within the 30 days after launch. The two points from Lenovo are likewise associated as well processes, are characterised by Microsoft as important-severity Security Feature Bypass faults and are considered much less prone to be exploited throughout the subsequent 30 days. (It ought to be famous that Microsoft mentions the Lenovo releases merely as advisory data.)

CVE-2024-26234 – Proxy Driver Spoofing Vulnerability

As talked about above, again in December, Sophos X-Ops opened an investigation of a suspicious-looking executable that claimed to be signed by a legitimate Microsoft Hardware Publisher Certificate. You can examine what occurred subsequent in our writeup of what we found. For Microsoft’s half, the corporate has added the related information to its rolling revocation listing, which is up to date on this patch cycle below this CVE. It is the only real problem this month that’s thought of to be publicly disclosed.

A Tough Month for SQL Server

Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability – 13 patches
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability – 24 patches
Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability – 3 patches
Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability – 1 patch

These 41 patches are all important-severity points with CVE numbers seemingly assigned from Microsoft’s CAN block (nearly all of them are sequential, which normally signifies that they have been drawn from the identical block at about the identical time). Microsoft says that none of them are at present below lively exploitation and that they imagine exploitation is much less seemingly within the 30 days after launch.

A bar chart showing the severity of all 2024 Microsoft patches, sorted by impact

Figure 3: Security Feature Bypass leaps to 3rd place within the cumulative patch totals for 2024, although RCE nonetheless leads the pack

Sophos protections

CVE Sophos Intercept X/Endpoint IPS Sophos XGS Firewall
CVE-2024-26209 Exp/2426209-A Exp/2426209-A
CVE-2024-26211 Exp/2426211-A Exp/2426211-A
CVE-2024-26212 Exp/2426212-A sid:2309495
CVE-2024-26218 Exp/2426218-A Exp/2426218-A
CVE-2024-26230 Exp/2426230-A Exp/2426230-A
CVE-2024-26234 Mal/Proxcat-A N/A

 

As you’ll be able to each month, in the event you don’t need to wait to your system to tug down Microsoft’s updates itself, you’ll be able to obtain them manually from the Windows Update Catalog web site. Run the winver.exe software to find out which construct of Windows 10 or 11 you’re working, then obtain the Cumulative Update package deal to your particular system’s structure and construct quantity.

Appendix A: Vulnerability Impact and Severity

This is an inventory of April patches sorted by affect, then sub-sorted by severity. Each listing is additional organized by CVE. In an effort to maintain our readers knowledgeable, we additionally present CVSS base and temp scores as these develop into accessible, since these might differ from Microsoft’s self-assessments.

Remote Code Execution (68 CVEs)

 

Critical severity
CVE-2024-21322 Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2024-21323 Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2024-29053 Microsoft Defender for IoT Remote Code Execution Vulnerability
Important severity
CVE-2024-20678 Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2024-21409 .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVE-2024-26179 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-26193 Azure Migrate Remote Code Execution Vulnerability
CVE-2024-26195 DHCP Server Service Remote Code Execution Vulnerability
CVE-2024-26200 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-26202 DHCP Server Service Remote Code Execution Vulnerability
CVE-2024-26205 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-26208 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-26210 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-26214 Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
CVE-2024-26221 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26222 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26223 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26224 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26227 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26231 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26232 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-26233 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26244 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-26252 Windows rndismp6.sys Remote Code Execution Vulnerability
CVE-2024-26253 Windows rndismp6.sys Remote Code Execution Vulnerability
CVE-2024-26256 libarchive Remote Code Execution Vulnerability
CVE-2024-26257 Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-28906 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28908 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28909 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28910 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28911 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28912 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28913 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28914 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28915 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28926 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28927 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28929 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28930 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28931 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28932 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28933 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28934 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28935 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28936 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28937 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28938 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28939 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28940 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28941 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28942 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28943 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28944 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28945 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29043 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29044 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29045 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29046 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-29047 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29048 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29050 Windows Cryptographic Services Remote Code Execution Vulnerability
CVE-2024-29066 Windows Distributed File System (DFS) Remote Code Execution Vulnerability
CVE-2024-29982 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29983 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29984 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29985 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

 

Elevation of Privilege (31 CVEs)

Important severity
CVE-2024-20693 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21324 Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVE-2024-21424 Azure Compute Gallery Elevation of Privilege Vulnerability
CVE-2024-21447 Windows Authentication Elevation of Privilege Vulnerability
CVE-2024-26158 Microsoft Install Service Elevation of Privilege Vulnerability
CVE-2024-26211 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-26213 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-26216 Windows File Server Resource Management Service Elevation of Privilege Vulnerability
CVE-2024-26218 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26229 Windows CSC Service Elevation of Privilege Vulnerability
CVE-2024-26230 Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-26235 Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-26236 Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-26237 Windows Defender Credential Guard Elevation of Privilege Vulnerability
CVE-2024-26239 Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-26241 Win32k Elevation of Privilege Vulnerability
CVE-2024-26242 Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-26243 Windows USB Print Driver Elevation of Privilege Vulnerability
CVE-2024-26245 Windows SMB Elevation of Privilege Vulnerability
CVE-2024-26248 Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-28904 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-28905 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-28907 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-28917 Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
CVE-2024-29052 Windows Storage Elevation of Privilege Vulnerability
CVE-2024-29054 Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVE-2024-29055 Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVE-2024-29056 Windows Authentication Elevation of Privilege Vulnerability
CVE-2024-29989 Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2024-29990 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVE-2024-29993 Azure CycleCloud Elevation of Privilege Vulnerability

 

Security Feature Bypass (26 CVEs)

Important severity
CVE-2024-20665 BitLocker Security Feature Bypass Vulnerability
CVE-2024-20669 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-20688 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-20689 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26168 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26171 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26175 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26180 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26189 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26194 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26228 Windows Cryptographic Services Security Feature Bypass Vulnerability
CVE-2024-26240 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26250 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28896 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28897 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28898 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28903 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28919 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28920 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28921 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28922 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28923 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28924 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28925 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-29061 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-29062 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-29988 Internet Shortcut Files Security Feature Bypass Vulnerability

 

Information Disclosure (12 CVEs)

Important severity
CVE-2024-26172 Microsoft DWM Core Library Information Disclosure Vulnerability
CVE-2024-26207 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-26209 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVE-2024-26217 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-26220 Windows Mobile Hotspot Information Disclosure Vulnerability
CVE-2024-26226 Windows Distributed File System (DFS) Information Disclosure Vulnerability
CVE-2024-26255 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-28900 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-28901 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-28902 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-29063 Azure AI Search Information Disclosure Vulnerability
CVE-2024-29992 Azure Identity Library for .NET Information Disclosure Vulnerability

 

Denial of Service (7 CVEs)

Important severity
CVE-2024-26183 Windows Kerberos Denial of Service Vulnerability
CVE-2024-26212 DHCP Server Service Denial of Service Vulnerability
CVE-2024-26215 DHCP Server Service Denial of Service Vulnerability
CVE-2024-26219 HTTP.sys Denial of Service Vulnerability
CVE-2024-26254 Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
CVE-2024-29064 Windows Hyper-V Denial of Service Vulnerability
Moderate severity
CVE-2024-20685 Azure Private 5G Core Denial of Service Vulnerability

 

Spoofing (3 CVEs)

Important severity
CVE-2024-20670 Outlook for Windows Spoofing Vulnerability
CVE-2024-26234 Proxy Driver Spoofing Vulnerability
CVE-2024-26251 Microsoft SharePoint Server Spoofing Vulnerability

 

 

Appendix B: Exploitability

This is an inventory of the April CVEs already below exploit within the wild, and people judged by Microsoft to be extra prone to be exploited within the wild throughout the first 30 days post-release. The listing is organized by CVE.

Exploitation detected
CVE-2024-26234 Proxy Driver Spoofing Vulnerability
CVE-2024-28903 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28921 Secure Boot Security Feature Bypass Vulnerability
Exploitation extra seemingly throughout the subsequent 30 days
CVE-2024-26158 Microsoft Install Service Elevation of Privilege Vulnerability
CVE-2024-26209 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVE-2024-26211 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-26212 DHCP Server Service Denial of Service Vulnerability
CVE-2024-26218 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26230 Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-26239 Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-26241 Win32k Elevation of Privilege Vulnerability
CVE-2024-26256 libarchive Remote Code Execution Vulnerability
CVE-2024-29056 Windows Authentication Elevation of Privilege Vulnerability
CVE-2024-29988 Internet Shortcut Files Security Feature Bypass Vulnerability

 

Appendix C: Products Affected

This is an inventory of April’s patches sorted by product household, then sub-sorted by severity. Each listing is additional organized by CVE. Patches which are shared amongst a number of product households are listed a number of occasions, as soon as for every product household.

Windows (90 CVEs)

Important severity
CVE-2024-20665 BitLocker Security Feature Bypass Vulnerability
CVE-2024-20669 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-20678 Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2024-20688 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-20689 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-20693 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21447 Windows Authentication Elevation of Privilege Vulnerability
CVE-2024-26158 Microsoft Install Service Elevation of Privilege Vulnerability
CVE-2024-26168 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26171 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26172 Microsoft DWM Core Library Information Disclosure Vulnerability
CVE-2024-26175 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26179 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-26180 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26183 Windows Kerberos Denial of Service Vulnerability
CVE-2024-26189 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26194 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26195 DHCP Server Service Remote Code Execution Vulnerability
CVE-2024-26200 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-26202 DHCP Server Service Remote Code Execution Vulnerability
CVE-2024-26205 Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-26207 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-26208 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-26209 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVE-2024-26210 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-26211 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-26212 DHCP Server Service Denial of Service Vulnerability
CVE-2024-26213 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-26214 Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability
CVE-2024-26215 DHCP Server Service Denial of Service Vulnerability
CVE-2024-26216 Windows File Server Resource Management Service Elevation of Privilege Vulnerability
CVE-2024-26217 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-26218 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26219 HTTP.sys Denial of Service Vulnerability
CVE-2024-26220 Windows Mobile Hotspot Information Disclosure Vulnerability
CVE-2024-26221 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26222 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26223 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26224 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26226 Windows Distributed File System (DFS) Information Disclosure Vulnerability
CVE-2024-26227 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26228 Windows Cryptographic Services Security Feature Bypass Vulnerability
CVE-2024-26229 Windows CSC Service Elevation of Privilege Vulnerability
CVE-2024-26230 Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-26231 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26232 Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-26233 Windows DNS Server Remote Code Execution Vulnerability
CVE-2024-26234 Proxy Driver Spoofing Vulnerability
CVE-2024-26235 Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-26236 Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-26237 Windows Defender Credential Guard Elevation of Privilege Vulnerability
CVE-2024-26239 Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-26240 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26241 Win32k Elevation of Privilege Vulnerability
CVE-2024-26242 Windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-26243 Windows USB Print Driver Elevation of Privilege Vulnerability
CVE-2024-26244 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-26245 Windows SMB Elevation of Privilege Vulnerability
CVE-2024-26248 Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-26250 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-26252 Windows rndismp6.sys Remote Code Execution Vulnerability
CVE-2024-26253 Windows rndismp6.sys Remote Code Execution Vulnerability
CVE-2024-26254 Microsoft Virtual Machine Bus (VMBus) Denial of Service Vulnerability
CVE-2024-26255 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-26256 libarchive Remote Code Execution Vulnerability
CVE-2024-28896 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28897 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28898 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28900 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-28901 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-28902 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-28903 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28904 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-28905 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-28907 Microsoft Brokering File System Elevation of Privilege Vulnerability
CVE-2024-28919 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28920 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28921 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28922 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28923 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28924 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28925 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-29050 Windows Cryptographic Services Remote Code Execution Vulnerability
CVE-2024-29052 Windows Storage Elevation of Privilege Vulnerability
CVE-2024-29056 Windows Authentication Elevation of Privilege Vulnerability
CVE-2024-29061 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-29062 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-29064 Windows Hyper-V Denial of Service Vulnerability
CVE-2024-29066 Windows Distributed File System (DFS) Remote Code Execution Vulnerability
CVE-2024-29988 Internet Shortcut Files Security Feature Bypass Vulnerability

 

SQL Server (38 CVEs)

Important severity
CVE-2024-28906 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28908 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28909 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28910 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28911 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28912 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28913 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28914 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28915 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28926 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28927 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28929 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28930 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28931 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28932 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28933 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28934 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28935 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28936 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28937 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28938 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28939 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28940 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28941 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28942 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28943 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28944 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28945 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29043 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29044 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29045 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29046 Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-29047 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29048 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29982 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29983 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29984 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-29985 Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability

 

Visual Studio (11 CVEs)

Important severity
CVE-2024-21409 .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability
CVE-2024-28929 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28930 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28931 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28932 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28933 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28934 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28935 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28936 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28937 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
CVE-2024-28938 Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability

 

Azure (9 CVEs)

Important severity
CVE-2024-21424 Azure Compute Gallery Elevation of Privilege Vulnerability
CVE-2024-26193 Azure Migrate Remote Code Execution Vulnerability
CVE-2024-28917 Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
CVE-2024-29063 Azure AI Search Information Disclosure Vulnerability
CVE-2024-29989 Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2024-29990 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVE-2024-29993 Azure CycleCloud Elevation of Privilege Vulnerability
Moderate severity
CVE-2024-20685 Azure Private 5G Core Denial of Service Vulnerability
CVE-2024-29992 Azure Identity Library for .NET Information Disclosure Vulnerability

 

Defender (6 CVEs)

Critical severity
CVE-2024-21322 Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2024-21323 Microsoft Defender for IoT Remote Code Execution Vulnerability
CVE-2024-29053 Microsoft Defender for IoT Remote Code Execution Vulnerability
Important severity
CVE-2024-21324 Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVE-2024-29054 Microsoft Defender for IoT Elevation of Privilege Vulnerability
CVE-2024-29055 Microsoft Defender for IoT Elevation of Privilege Vulnerability

 

.NET (1 CVE)

Important severity
CVE-2024-21409 .NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

 

365 (1 CVE)

Important severity
CVE-2024-26257 Microsoft Excel Remote Code Execution Vulnerability

 

Office (1 CVE)

Important severity
CVE-2024-26257 Microsoft Excel Remote Code Execution Vulnerability

 

Outlook (1 CVE)

Important severity
CVE-2024-20670 Outlook for Windows Spoofing Vulnerability

 

SharePoint (1 CVE)

Important severity
CVE-2024-26251 Microsoft SharePoint Server Spoofing Vulnerability

 

Appendix D: Advisories and Other Products

This is an inventory of advisories and knowledge on different related CVEs within the April Microsoft launch, sorted by product.

Relevant to Edge / Chromium (5 CVEs)

CVE-2024-3156 Chromium: CVE-2024-3156 Inappropriate implementation in V8
CVE-2024-3158 Chromium: CVE-2024-3158 Use after free in Bookmarks
CVE-2024-3159 Chromium: CVE-2024-3159 Out of bounds reminiscence entry in V8
CVE-2024-29049 Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability
CVE-2024-29981 Microsoft Edge (Chromium-based) Spoofing Vulnerability

 

Relevant to Windows (non-Microsoft launch) (5 CVEs)

CVE-2019-3816 Red Hat: <unnamed CBL Mariner path transversal problem>
CVE-2019-3833 Red Hat: <unnamed CBL Mariner infinite loop problem>
CVE-2024-2201 Intel: CVE-2024-2201 Side Channel Execution
CVE-2024-23593 Lenovo: CVE-2024-23593 Zero Out Boot Manager and drop to UEFI Shell
CVE-2024-23594 Lenovo: CVE-2024-23594 Stack Buffer Overflow in LenovoBT.efi

 

Other

ADV990001 Latest Servicing Stack Updates

 

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here