Microsoft’s Security Update in July of High-Risk Vulnerabilities in Multiple Products

Microsoft’s Security Update in July of High-Risk Vulnerabilities in Multiple Products

julho 12, 2024 | NSFOCUS

Overview

On July 10, NSFOCUS CERT detected that Microsoft released a security update patch for July, which fixed 139 security issues involving Windows, Microsoft SQL Server, Microsoft Office, Azure and other widely used products, including high-risk vulnerabilities such as privilege escalation and remote code execution.

Among the vulnerabilities fixed in Microsoft’s monthly update this month, 5 are critical and 132 are important. These include 2 exploitable vulnerabilities:

Windows Hyper-V privilege escalation vulnerability (CVE-2024-38080)

Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-38112)

Please update patches for protection as soon as possible. For a complete list of vulnerabilities, see the appendix.

Reference link: https://msrc.microsoft.com/update-guide/releaseNote/2024-Jul

Key Vulnerabilities

Screen out the vulnerabilities with great impact in this update according to product popularity and vulnerability importance. Please pay attention to them:

Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2024-38023/CVE-2024-38024/CVE-2024-38094):

Multiple remote code execution vulnerabilities are present in Microsoft SharePoint Server due to insecure input validation when processing serialized data within the Microsoft SharePoint Server. An attacker with site owner privileges or higher can execute arbitrary code in the context of SharePoint Server by uploading specially crafted files to the target SharePoint Server and making specialized API requests that trigger deserialization of file parameters.

Official Announcement Link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38023

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38024

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38094

Remote Code Execution Vulnerability of Windows Imaging Component (CVE-2024-38060):

The Windows Imaging component has a remote code execution vulnerability. Due to the buffer overflow issue in the Windows Imaging component, an attacker with ordinary user rights can upload malicious TIFF files to the server and execute arbitrary code on the target system.

Official Announcement Link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38060

Remote code execution vulnerability of Windows remote desktop authorization service (CVE-2024-38074/CVE-2024-38076/CVE-2024-38077):

CVE-2024-38074: The Windows Remote Desktop Authorization Service has a remote code execution vulnerability. Due to integer underflow or wrapback issues in the Windows Remote Desktop Authorization Service, unauthenticated attackers can send special packets to the server set as the remote desktop authorization server, triggering integer underflow and executing arbitrary codes on the target system.

CVE-2024-38076/CVE-2024-38077: The Windows remote desktop authorization service has multiple remote code execution vulnerabilities. Due to the heap-based buffer overflow in the Windows remote desktop authorization service, unauthenticated attackers can send special packets to the server set as the remote desktop authorization server, triggering the buffer overflow and executing arbitrary codes on the target system.

Official Announcement Link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38074

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38076

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38077

Windows Hyper-V privilege escalation vulnerability (CVE-2024-38080):

Windows Hyper-V has a privilege escalation vulnerability. Due to integer overflow or wrapping issues in Windows Hyper-V, local attackers authenticated by ordinary users can exploit this vulnerability by running special programs to obtain SYSTEM permissions of the target system. At present, this vulnerability has been found to be exploited.

Official Announcement Link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38080

Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-38112):

Windows MSHTML Platform has a spoofing vulnerability, which can be exploited by an unauthenticated remote attacker sending a special malicious file to the victim and tricking it into running due to improper input validation. At present, this vulnerability has been found to be exploited.

Official Announcement Link:

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38112

Scope of Impact

The following are some affected product versions that focus on vulnerabilities. For the scope of other products affected by vulnerabilities, please refer to the official announcement link.

Vulnerability No.Affected product versions
CVE-2024-38023
CVE-2024-38024
CVE-2024-38094
Microsoft SharePoint Server Subscription Edition
Microsoft SharePoint Server 2019
Microsoft SharePoint Enterprise Server 2016
CVE-2024-38060Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
CVE-2024-38074Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
CVE-2024-38076Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
CVE-2024-38077Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
CVE-2024-38080Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
CVE-2024-38112Windows 10 Version 1809 for 32-bit Systems
Windows Server 2019
Windows 11 Version 22H2 for x64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows Server 2022
Windows 11 version 21H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows Server 2019 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2022 (Server Core installation)
Windows 10 Version 21H2 for ARM64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 22H2 for 32-bit Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows Server 2012 R2
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 for 32-bit Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 10 Version 22H2 for x64-based Systems

Mitigation

Patch update

At present, Microsoft has officially released security patches to fix the above vulnerabilities for supported product versions. It is strongly recommended that affected users install patches as soon as possible for protection. The official download link:

https://msrc.microsoft.com/update-guide/releaseNote/2024-Jul

Note: Patch update of Windows Update may fail due to network problems, computer environment problems and other reasons. After installing the patch, users shall check whether the patch is successfully updated in time.

Right-click on the Windows icon, select “Settings (N)”, select “Updates and Security”-“Windows Updates” to view prompts on this page, or click “View Update History” to view historical updates. For updates that have not been successfully installed, you can click the name of the update to jump to Microsoft’s official download page. It is recommended that users click on the link on this page and go to the “Microsoft Update Catalog” website to download the independent package and install it.

Appendix: Vulnerability List

Affected productsCVE No.Vulnerability NameSeverity
Microsoft OfficeCVE-2024-38023Microsoft SharePoint Server Remote Execution VulnerabilityCritical
WindowsCVE-2024-38060Windows Imaging Component Remote Code Execution VulnerabilityCritical
WindowsCVE-2024-38077Windows Remote Desktop Licensing Service VulnerabilityCritical
WindowsCVE-2024-38074Windows Remote Desktop Licensing Service VulnerabilityCritical
WindowsCVE-2024-38076Windows Remote Desktop Licensing Service VulnerabilityCritical
Microsoft DynamicsCVE-2024-30061Microsoft Dynamics 365 (On-Premises) VulnerabilityImportant
WindowsCVE-2024-21417Windows Text Services Framework Permission Escalation VulnerabilityImportant
WindowsCVE-2024-28899Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-30081Windows NTLM spoofing vulnerabilityImportant
WindowsCVE-2024-30098Windows Cryptographic Services Security Features Bypass VulnerabilitiesImportant
.NET,Microsoft Visual StudioCVE-2024-35264.NET and Visual Studio remote code execution vulnerabilitiesImportant
WindowsCVE-2024-35270Windows iSCSI Service Denial of Service VulnerabilityImportant
Microsoft SQL ServerCVE-2024-38088SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-38087SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21332SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21333SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21335SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21373SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21398SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21414SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21415SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21428SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37318SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37332SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37331SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
WindowsCVE-2024-37969Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37970Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37974Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37981Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37986Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37987Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-38013Microsoft Windows Server Backup Permission Escalation VulnerabilityImportant
WindowsCVE-2024-38015Windows Remote Desktop Gateway (RD Gateway) Denial-of-Service VulnerabilityImportant
WindowsCVE-2024-38022Windows Image Acquisition Permission Escalation VulnerabilityImportant
Microsoft OfficeCVE-2024-38024Microsoft SharePoint Server Remote Execution VulnerabilityImportant
WindowsCVE-2024-38025Microsoft Windows Performance Data Helper Library Remote Code Execution VulnerabilityImportant
WindowsCVE-2024-38034Windows Filtering Platform Privilege Escalation VulnerabilityImportant
WindowsCVE-2024-38041Windows Kernel Information Disclosure VulnerabilityImportant
WindowsCVE-2024-38043PowerShell privilege escalation vulnerabilityImportant
WindowsCVE-2024-38051Windows Graphics Component Remote Code Execution VulnerabilityImportant
WindowsCVE-2024-38054Kernel Streaming WOW Thunk Service Driver Permission Upgrade VulnerabilityImportant
WindowsCVE-2024-38055Microsoft Windows Codecs Library Information Disclosure VulnerabilitiesImportant
WindowsCVE-2024-38056Microsoft Windows Codecs Library Information Disclosure VulnerabilitiesImportant
WindowsCVE-2024-38059Win32k privilege escalation vulnerabilityImportant
WindowsCVE-2024-38061DCOM Remote Cross-Session Activation Privilege Escalation VulnerabilityImportant
WindowsCVE-2024-38062Windows Kernel-Mode Driver Privilege Escalation VulnerabilityImportant
WindowsCVE-2024-38064Windows TCP/IP Information Disclosure VulnerabilityImportant
WindowsCVE-2024-38071Windows Remote Desktop Licensing Service VulnerabilityImportant
WindowsCVE-2024-38072Windows Remote Desktop Licensing Service VulnerabilityImportant
WindowsCVE-2024-38080Windows Hyper-V privilege escalation vulnerabilityImportant
WindowsCVE-2024-38085Windows Graphics Component Permission Escalation VulnerabilityImportant
AzureCVE-2024-38086Remote code execution vulnerability in Azure Kinect SDKImportant
WindowsCVE-2024-38091Microsoft WS-Discovery Denial of Service VulnerabilityImportant
WindowsCVE-2024-38100Windows File Explorer privilege escalation vulnerabilityImportant
WindowsCVE-2024-38102Windows Layer-2 Bridge Network Driver Denial of Service VulnerabilityImportant
WindowsCVE-2024-38104Windows Fax Service Remote Code Execution VulnerabilityImportant
WindowsCVE-2024-38112Windows MSHTML Platform Spoofing VulnerabilityImportant
WindowsCVE-2024-26184Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-30013Windows MultiPoint Services remote code execution vulnerabilityImportant
Microsoft OfficeCVE-2024-32987Microsoft SharePoint Server Disclosure VulnerabilityImportant
WindowsCVE-2024-30071Windows Remote Access Connection Manager Information Disclosure VulnerabilityImportant
WindowsCVE-2024-30079Windows Remote Access Connection Manager Privilege Escalation VulnerabilityImportant
.NET,Microsoft Visual StudioCVE-2024-30105.NET Core and Visual Studio Denial-of-Service VulnerabilitiesImportant
AzureCVE-2024-35261Azure Network Watcher VM Extension Permission Escalation VulnerabilityImportant
AzureCVE-2024-35266Azure DevOps Server Spoofing VulnerabilityImportant
AzureCVE-2024-35267Azure DevOps Server Spoofing VulnerabilityImportant
Microsoft SQL ServerCVE-2024-35271SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-35272SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-20701SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21303SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21308SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21317SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21331SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21425SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37319SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37320SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37321SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37322SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37323SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37324SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-21449SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37326SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37327SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37328SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37329SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37330SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL Server,Microsoft OLE DB DriverCVE-2024-37334Microsoft OLE DB Driver for SQL Server RemoteCodeExecutionVulnerabilityImportant
Microsoft SQL ServerCVE-2024-37333SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-37336SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-28928SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
Microsoft SQL ServerCVE-2024-35256SQL Server Native Client OLE DB Provider Remote Execution VulnerabilityImportant
WindowsCVE-2024-37971Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37972Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37973Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37975Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37977Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37978Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37984Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37988Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-37989Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-38010Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-38011Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-38017Microsoft Message Queuing VulnerabilityImportant
WindowsCVE-2024-38019Microsoft Windows Performance Data Helper Library Remote Code Execution VulnerabilityImportant
Microsoft OfficeCVE-2024-38021Microsoft Office remote code execution vulnerabilityImportant
WindowsCVE-2024-38027Windows Line Printer Daemon Service VulnerabilityImportant
WindowsCVE-2024-38028Microsoft Windows Performance Data Helper Library Remote Code Execution VulnerabilityImportant
WindowsCVE-2024-38030Windows Themes Spoofing VulnerabilityImportant
WindowsCVE-2024-38031Windows Online Certificate Status Protocol (OCSP) Server Denial-of-Service VulnerabilityImportant
WindowsCVE-2024-38032Microsoft Xbox remote code execution vulnerabilityImportant
WindowsCVE-2024-38033PowerShell privilege escalation vulnerabilityImportant
WindowsCVE-2024-38044DHCP Server Service remote code execution vulnerabilityImportant
WindowsCVE-2024-38047PowerShell privilege escalation vulnerabilityImportant
WindowsCVE-2024-38048Windows Network Driver Interface Specification (NDIS) Denial-of-Service VulnerabilityImportant
WindowsCVE-2024-38049Windows Distributed Transaction Coordinator Remote Code Execution VulnerabilityImportant
WindowsCVE-2024-38050Windows Workstation Service privilege escalation vulnerabilityImportant
WindowsCVE-2024-38052Kernel Streaming WOW Thunk Service Driver Permission Upgrade VulnerabilityImportant
WindowsCVE-2024-38053Windows Layer-2 Bridge Network Driver Remote Code Execution VulnerabilityImportant
WindowsCVE-2024-38057Kernel Streaming WOW Thunk Service Driver Permission Upgrade VulnerabilityImportant
WindowsCVE-2024-38058BitLocker security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-38065Secure Boot security function bypasses vulnerabilitiesImportant
WindowsCVE-2024-38066Windows Win32k privilege escalation vulnerabilityImportant
WindowsCVE-2024-38067Windows Online Certificate Status Protocol (OCSP) Server Denial-of-Service VulnerabilityImportant
WindowsCVE-2024-38068Windows Online Certificate Status Protocol (OCSP) Server Denial-of-Service VulnerabilityImportant
WindowsCVE-2024-38069Windows Enroll Engine Security Feature Bypass VulnerabilitiesImportant
WindowsCVE-2024-38070Windows LockDown Policy (WLDP) Security Feature Bypass VulnerabilitiesImportant
WindowsCVE-2024-38073Windows Remote Desktop Licensing Service VulnerabilityImportant
WindowsCVE-2024-38078Xbox Wireless Adapter remote code execution vulnerabilityImportant
WindowsCVE-2024-38079Windows Graphics Component Permission Escalation VulnerabilityImportant
Microsoft .NET Framework,.NET,Microsoft Visual StudioCVE-2024-38081.NET, .NET Framework, and Visual Studio Permissions Escalation vulnerabilityImportant
System CenterCVE-2024-38089Microsoft Defender for IoT Privilege Elevation VulnerabilityImportant
AzureCVE-2024-38092Azure CycleCloud privilege escalation vulnerabilityImportant
Microsoft OfficeCVE-2024-38094Microsoft SharePoint remote code execution vulnerabilityImportant
.NET,Microsoft Visual StudioCVE-2024-38095.NET and Visual Studio Denial of Service VulnerabilitiesImportant
WindowsCVE-2024-38099Windows Remote Desktop Licensing Service VulnerabilityImportant
WindowsCVE-2024-38101Windows Layer-2 Bridge Network Driver Denial of Service VulnerabilityImportant
WindowsCVE-2024-38105Windows Layer-2 Bridge Network Driver Denial of Service VulnerabilityImportant
Microsoft OfficeCVE-2024-38020Microsoft Outlook Spoofing VulnerabilityModerate

Statement

This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and/or indirect consequences and losses caused by transmitting and/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add/delete any information to/from it, or use this advisory for commercial purposes without permission from NSFOCUS.

About NSFOCUS

NSFOCUS, a pioneering leader in cybersecurity, is dedicated to safeguarding telecommunications, Internet service providers, hosting providers, and enterprises from sophisticated cyberattacks.

Founded in 2000, NSFOCUS operates globally with over 4000 employees at two headquarters in Beijing, China, and Santa Clara, CA, USA, and over 50 offices worldwide. It has a proven track record of protecting over 25% of the Fortune Global 500 companies, including four of the five largest banks and six of the world’s top ten telecommunications companies.

Leveraging technical prowess and innovation, NSFOCUS delivers a comprehensive suite of security solutions, including the Intelligent Security Operations Platform (ISOP) for modern SOC, DDoS Protection, Continuous Threat Exposure Management (CTEM) Service and Web Application and API Protection (WAAP). All the solutions and services are augmented by the Security Large Language Model (SecLLM), ML, patented algorithms and other cutting-edge research achievements developed by NSFOCUS.