The Latest Patches Unveiled in July

As the information security sector’s leading conferences, Black Hat Briefings and Def Con, draw near, Microsoft has gone all out for July by significantly increasing the number of updates compared to June.

July Patch Tuesday Unleashes a Torrent of Updates

As the information security sector’s leading conferences, Black Hat Briefings and Def Con, draw near, Microsoft has gone all out for July by significantly increasing the number of updates compared to June. The updates address issues found in Windows, Office, and various server and cloud software platforms.

One of the key components receiving extensive fixes in this month’s updates is Microsoft SQL Server. Among the updates is a patch for 38 distinct remote code execution vulnerabilities in the OLE database driver. These vulnerabilities could be exploited if an authenticated account is deceived into connecting to a malicious SQL Server database. When the malicious database returns data that triggers arbitrary code execution on the client, the attack occurs.

This month’s updates primarily focus on remote code execution vulnerabilities, with 59 RCEs accounting for over 43% of the total issues resolved in the cumulative update. Five of the RCE vulnerabilities are rated as “critical” by Microsoft, affecting SharePoint Server, Windows Remote Desktop Licensing Service, and the Windows Codec library.

July’s list of vulnerabilities includes 13 considered to be more exploitable than others by Microsoft, including critical bugs in SharePoint Server and the Windows Codec library. Fortunately, only one of the fixed bugs has been exploited or made public so far—CVE-2024-38080, a privilege escalation exploit in the Windows Hyper-V hypervisor for virtual machines. Six of this month’s bugs can be detected through Sophos IPS rules in the XGS Firewall, details of which are provided in a table at the end of this document.

While most of the vulnerabilities were reported directly to Microsoft, some bug reports came from external organizations that responsibly disclosed the information. For instance, Adobe reported CVE-2024-34122, an unexploited remote code execution vulnerability in the Chromium version of the Edge browser, which was resolved before Patch Tuesday with the release of version 126.0.2592.81 on June 27.

Statistics Summary

  • Total Microsoft CVEs: 138
  • Total Edge / Chrome advisory issues covered in the update: 1
  • Total non-Microsoft advisory issues covered in the update: 4
  • Total Adobe issues covered in the update: 1
  • Publicly disclosed: 1
  • Exploited: 1
  • Severity:
    • Critical: 5
    • Important: 132
    • Moderate: 1
  • Impact:
    • Remote Code Execution: 59
    • Elevation of Privilege: 24
    • Security Feature Bypass: 24
    • Denial of Service: 17
    • Information Disclosure: 8
    • Spoofing: 7
July's Patch Tuesday addresses 138 bugs in six vulnerability categories
July’s Patch Tuesday addresses 138 bugs in six vulnerability categories

Highlighted Products

  • Windows (including .NET and ASP.NET): 87
  • Microsoft SQL Server: 38
  • Azure: 5
  • SharePoint: 4
  • Office: 2
  • Dynamics 365: 1
  • Microsoft Defender for IoT: 1
Windows accounts for almost two-thirds of July's patches
Windows accounts for almost two-thirds of July’s patches

Updates to Note in July

While many issues have been addressed, some specific updates deserve special mention.

Microsoft SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability

This month, Microsoft has resolved 38 CVEs in its extensive database lineup. The patches target various aspects of a common exploit scenario: If an attacker can convince an authenticated user of a legitimate MS-SQL database server to connect to their malicious MS-SQL Server, malicious code residing on the server can then travel to and execute on the client.

The complex exploit demands preparatory work from attackers, involving setting up a database server with malicious content in its tables. Additionally, it requires the targeted user to have not updated their SQL Server client software with this month’s all-encompassing update, as well as for the attackers to identify and target a database administrator successfully. Avoid being the perfect target.

CVE-2024-38060 – Microsoft Windows Codecs Library Remote Code Execution Vulnerability

In 1986, as the world was mesmerized by the on-screen exploits of daring fighter pilots, the TIFF image file format emerged, introduced by Aldus Corporation, now Adobe. This CVE tackles a critical vulnerability exclusive to this format that is easily exploitable. A specially crafted malicious TIFF file can lead to…

Uploaded onto a susceptible server, may have activated the server to execute malicious code hidden in the TIFF file. Make sure to secure your servers to remove this risk.

Microsoft Xbox Remote Code Execution Vulnerability (CVE-2024-38032)

Players of the Xbox gaming console with a wireless adapter, who connect wirelessly to their local network, need to be cautious of potential intruders on their network who could target these devices. There is a potential threat where an individual connected to your wireless network could send a harmful network packet to the Xbox, potentially executing unauthorized commands. To prevent such risks, avoid allowing unknown parties onto your WLAN.

Heading into summer, RCE bugs comprise nearly 40% of the total patched bugs so far in calendar year 2024
Heading into summer, RCE bugs comprise nearly 40% of the total patched bugs so far in calendar year 2024

Measures by Sophos

CVE Sophos Intercept X/Endpoint IPS Sophos XGS Firewall
CVE-2024-38021 sid:2309849, sid:2309850 sid:2309849, sid:2309850
CVE-2024-38052 Exp/2438052-A
CVE-2024-38054 Exp/2438054-A
CVE-2024-38059 Exp/2438059-A
CVE-2024-38080 Exp/2438080-A
CVE-2024-38085 Exp/2438085-A

If you prefer not to wait for your system to automatically fetch Microsoft’s updates every month, you can manually download them from the Microsoft Update Catalog website. Use the winver.exe tool to identify your Windows build, then download the appropriate Cumulative Update package for your system’s architecture and build.

Vulnerability Impact and Severity: Appendix A

This categorizes July patches based on impact and severity, arranged by CVE.

Denial of Service (17 CVEs)

Important severity
CVE-2024-30105 .NET Denial of Service Vulnerability
CVE-2024-35270 Windows iSCSI Service Denial of Service Vulnerability
CVE-2024-38015 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVE-2024-38027 Windows Line Printer Daemon Service Denial of Service Vulnerability
CVE-2024-38031 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
CVE-2024-38048 Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability
CVE-2024-38067 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
CVE-2024-38068 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
CVE-2024-38071 Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVE-2024-38072 Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVE-2024-38073 Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVE-2024-38091 Microsoft WS-Discovery Denial of Service Vulnerability
CVE-2024-38095 .NET Denial of Service Vulnerability
CVE-2024-38099 Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVE-2024-38101 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38102 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38105 Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

 

Elevation of Privileges (24 CVEs)

width=”117″>CVE-2024-38059

Important severity
CVE-2024-21417 Windows CoreMessaging Elevation of Privileges Vulnerability
CVE-2024-30079 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-35261 Azure Network Watcher VM Extension Elevation of Privilege Vulnerability
CVE-2024-38013 Microsoft Windows Server Backup Elevation of Privilege Vulnerability
CVE-2024-38022 Windows Image Acquisition Elevation of Privilege Vulnerability
CVE-2024-38033 PowerShell Elevation of Privilege Vulnerability
CVE-2024-38034 Windows Filtering Platform Elevation of Privilege Vulnerability
CVE-2024-38043 PowerShell Elevation of Privilege Vulnerability
CVE-2024-38047 PowerShell Elevation of Privilege Vulnerability
CVE-2024-38050 Windows Workstation Service Elevation of Privilege Vulnerability
CVE-2024-38052 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38054 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38057 Microsoft Streaming Service Elevation of Privilege Vulnerability
Win32k Security Elevation Vulnerability
CVE-2024-38061 Active Directory Certificate Services Security Elevation Vulnerability
CVE-2024-38062 Windows Clip Service Security Elevation Vulnerability
CVE-2024-38066 Windows Win32k Security Elevation Vulnerability
CVE-2024-38079 Windows Graphics Component Security Elevation Vulnerability
CVE-2024-38080 Windows Hyper-V Security Elevation Vulnerability
CVE-2024-38081 .NET, .NET Framework, and Visual Studio Security Elevation Vulnerability
CVE-2024-38085 Windows Win32 Kernel Subsystem Security Elevation Vulnerability
CVE-2024-38089 Microsoft Defender for IoT Security Elevation Vulnerability
CVE-2024-38092 Azure CycleCloud Security Elevation Vulnerability
CVE-2024-38100 Windows File Explorer Security Elevation Vulnerability

 

Data Leakage (9 CVEs)

Significant severity
CVE-2024-30061 Microsoft Dynamics 365 (On-Premises) Data Leakage Vulnerability
CVE-2024-30071 Windows Remote Access Connection Manager Data Leakage Vulnerability
CVE-2024-32987 Microsoft SharePoint Server Data Leakage Vulnerability
CVE-2024-37985 Intel ARM: Systematic Identification and Characterization of Proprietary Prefetchers
CVE-2024-38017 Microsoft Message Queuing Data Leakage Vulnerability
CVE-2024-38041 Windows Kernel Data Leakage Vulnerability
CVE-2024-38055 Microsoft Windows Codecs Library Data Leakage Vulnerability
CVE-2024-38056 Microsoft Windows Codecs Library Data Leakage Vulnerability
CVE-2024-38064 Windows TCP/IP Data Leakage Vulnerability

 

Code Execution Remotely (59 CVEs)

Urgent severity
CVE-2024-38023 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38060 Microsoft Windows Codecs Library Remote Code Execution Vulnerability
CVE-2024-38074 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38076 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38077 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Significant severity
CVE-2024-20701 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21303 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21308 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21317 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21331 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21332 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21333 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21335 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21373 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21398 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21414 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21415 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21425 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21428 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-21449 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-28928 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-30013 Windows MultiPoint Services Remote Code Execution Vulnerability
CVE-2024-35256 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-35264 .NET and Visual Studio Remote Code Execution Vulnerability
CVE-2024-35271 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-35272 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37318 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37319 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37320 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37321 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37322 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37323 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37324 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37326 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37327 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37328 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37329 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37330 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37331 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37332 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37333 SQL Server Native Client OLE DB Provider Remote Code Execution Vulnerability
CVE-2024-37334 Microsoft

Microsoft Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-38102 Microsoft Windows Remote Desktop Protocol Remote Code Execution Vulnerability
CVE-2024-38108 Microsoft Windows Scripting Engine Memory Corruption Vulnerability
CVE-2024-38109 Windows Digital Media Control Panel Elevation of Privilege Vulnerability
CVE-2024-38111 Microsoft Word Memory Corruption Vulnerability
CVE-2024-38115 Microsoft Outlook Elevation of Privilege Vulnerability
CVE-2024-38116 Microsoft Windows SMBv2 Share Elevation of Privilege Vulnerability
CVE-2024-38117 Windows Wireless Networking Driver Elevation of Privilege Vulnerability
CVE-2024-38118 Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-38120 Internet Explorer Memory Corruption Vulnerability
CVE-2024-38124 Microsoft Windows Store Elevation of Privilege Vulnerability
CVE-2024-38125 Windows Graphics Component Memory Corruption Vulnerability
CVE-2024-38127 Microsoft Windows Text Services Framework Remote Code Execution Vulnerability
CVE-2024-38128 Microsoft Windows Media Feature Pack Remote Code Execution Vulnerability
CVE-2024-38130 Windows DirectX Remote Code Execution Vulnerability
CVE-2024-38131 Microsoft Windows DirectX Graphics Kernel Subsystem Remote Code Execution Vulnerability
CVE-2024-38133 Windows D3D12 Remote Code Execution Vulnerability
CVE-2024-38135 Microsoft Windows Domain Controller Remote Code Execution Vulnerability
CVE-2024-38137 Windows Error Reporting Service Remote Code Execution Vulnerability
CVE-2024-38139 Windows Kernel Local Elevation of Privilege Vulnerability
CVE-2024-38140 Windows USB Mass Storage Class Driver Elevation of Privilege Vulnerability
CVE-2024-38142 Windows AppX Deployment Service Elevation of Privilege Vulnerability
CVE-2024-38145 Windows Kernel Remote Code Execution Vulnerability
CVE-2024-38149 Windows Management Infrastructure Remote Code Execution Vulnerability
CVE-2024-38152 Microsoft Windows Bluetooth Remote Code Execution Vulnerability
CVE-2024-38154 Microsoft Windows Media Player Remote Code Execution Vulnerability
CVE-2024-38157 Windows SMB Server Remote Code Execution Vulnerability
CVE-2024-38159 Microsoft Windows Kernel Remote Code Execution Vulnerability
CVE-2024-38163 Windows Network Data Usage Monitoring Helper Remote Code Execution Vulnerability
CVE-2024-38167 Microsoft Windows ALPC Remote Code Execution Vulnerability
Windows File Explorer Elevation of Privilege Vulnerability

Appendix C: Affected Products

Here is a compilation of July’s patches categorized by product families and arranged by severity levels. The lists are also categorized by CVE numbers. For patches that impact multiple product families, they are listed individually for each relevant family.

Windows (86 CVEs)

Critical Impact
CVE-2024-38060 Microsoft Windows Codecs Library Remote Code Execution Vulnerability
CVE-2024-38074 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38076 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38077 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
Significant Impact
CVE-2024-21417 Windows Text Services Framework Elevation of Privileges Vulnerability
CVE-2024-26184 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28899 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-30013 Windows MultiPoint Services Remote Code Execution Vulnerability
CVE-2024-30071 Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-30079 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-30081 Windows NTLM Spoofing Vulnerability
CVE-2024-30098 Windows Cryptographic Services Security Feature Bypass Vulnerability
CVE-2024-30105 .NET Denial of Service Vulnerability
CVE-2024-35264 ASP.NET Remote Code Execution Vulnerability
CVE-2024-35270 Windows iSCSI Service Denial of Service Vulnerability
CVE-2024-37969 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37970 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37971 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37972 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37973 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37974 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37975 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37977 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37978 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37981 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37984 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37986 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37987 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37988 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37989 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-38010 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-38011 Secure Boot Security Feature Bypass Vulnerability
CVE-2024-38013 Microsoft Windows Server Backup Elevation of Privilege Vulnerability
CVE-2024-38015 Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
CVE-2024-38017 Microsoft Message Queuing Information Disclosure Vulnerability
CVE-2024-38019 Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability
CVE-2024-38022 Windows Image Acquisition Elevation of Privilege Vulnerability
CVE-2024-38025 Windows Performance Monitor Remote Code Execution Vulnerability
CVE-2024-38027 Windows Line Printer Daemon Service Denial of Service Vulnerability
CVE-2024-38028 Windows Performance Monitor Remote Code Execution Vulnerability
CVE-2024-38030 Windows Themes Spoofing Vulnerability
CVE-2024-38031 Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
CVE-2024-38032 Windows Graphics Component Remote Code Execution Vulnerability
CVE-2024-38033 PowerShell Elevation of Privilege Vulnerability
CVE-2024-38034 Windows Filtering Platform Elevation of Privilege Vulnerability
CVE-2024-38041 Windows Kernel Information Disclosure Vulnerability
CVE-2024-38043 PowerShell Elevation of Privilege Vulnerability
CVE-2024-38044 DHCP Server Service Remote Code Execution Vulnerability
CVE-2024-38047 PowerShell Elevation of Privilege Vulnerability
CVE-2024-38048 Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability
CVE-2024-38049 Windows Distributed Transaction Coordinator Remote Code Execution Vulnerability
CVE-2024-38050 Windows Workstation Service Elevation of Privilege Vulnerability
CVE-2024-38051 Windows Graphics Component Remote Code Execution Vulnerability
CVE-2024-38052 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38053 Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
CVE-2024-38054 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38055 Microsoft Windows Codecs Library Information Disclosure Vulnerability
CVE-2024-38056 Exposed Vulnerability in Microsoft Windows Codecs Library
Identifier: CVE-2024-38057 Security Flaw Leading to Elevation of Privileges in Microsoft Streaming Service
Identifier: CVE-2024-38058 Weakness in BitLocker Security Feature Allowing Bypass
Identifier: CVE-2024-38059 Flaw Allowing Elevation of Privileges in Win32k System
Identifier: CVE-2024-38061 Security Vulnerability Enabling Privilege Escalation in Active Directory Certificate Services
Identifier: CVE-2024-38062 Potential Elevation of Privileges in Windows Clip Service
Identifier: CVE-2024-38064 Information Disclosure Vulnerability in Windows TCP/IP System
Identifier: CVE-2024-38065 Method to Bypass Secure Boot Feature
Identifier: CVE-2024-38066 Elevation of Privileges Flaw in Windows Win32k System
Identifier: CVE-2024-38067 Denial of Service Vulnerability in Windows Online Certificate Status Protocol (OCSP) Server
Identifier: CVE-2024-38068 Denial of Service Vulnerability Found in Windows Online Certificate Status Protocol (OCSP) Server
Identifier: CVE-2024-38069 Feature Bypass Vulnerability in Windows Enroll Engine
Identifier: CVE-2024-38070 Security Feature Bypass Vulnerability in Windows LockDown Policy (WLDP)
Identifier: CVE-2024-38071 Denial of Service Vulnerability in Windows Remote Desktop Licensing Service
Identifier: CVE-2024-38072 Denial of Service Vulnerability Discovered in Windows Remote Desktop Licensing Service
Identifier: CVE-2024-38073 Windows Remote Desktop Licensing Service Affected by Denial of Service Vulnerability
Identifier: CVE-2024-38078 Vulnerability Allowing Remote Code Execution in XBox Wireless Adapter
Identifier: CVE-2024-38079 Elevation of Privileges Vulnerability in Windows Graphics Component
Identifier: CVE-2024-38080 Potential Elevation of Privileges in Windows Hyper-V System
Identifier: CVE-2024-38081 Security Vulnerability Leading to Elevation of Privileges in .NET, .NET Framework, and Visual Studio
Identifier: CVE-2024-38085 Elevation of Privileges Vulnerability in Windows Win32 Kernel Subsystem
Identifier: CVE-2024-38091 Den…

VUL-2024-37328 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-37329 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-37330 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-37331 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-37332 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-37333 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-37334 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-37336 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-38087 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution
VUL-2024-38088 Vulnerability in Microsoft OLE DB Driver for SQL Server allowing Remote Code Execution

 

Azure (5 Vulnerabilities)

Severity level: Important
VUL-2024-35261 Vulnerability in Azure Network Watcher VM Extension allowing Elevation of Privilege
VUL-2024-35266 Vulnerability in Azure DevOps Server allowing Spoofing
VUL-2024-35267 Vulnerability in Azure DevOps Server allowing Spoofing
VUL-2024-38086 Vulnerability in Azure Kinect SDK allowing Remote Code Execution
VUL-2024-38092 Vulnerability in Azure CycleCloud allowing Elevation of Privilege

 

SharePoint (4 Vulnerabilities)

Severity level: Critical
VUL-2024-38023 Vulnerability in Microsoft SharePoint Server allowing Remote Code Execution
Severity level: Important
VUL-2024-32987 Vulnerability in Microsoft SharePoint Server allowing Information Disclosure
VUL-2024-38024 Vulnerability in Microsoft SharePoint Server allowing Remote Code Execution
VUL-2024-38094 Vulnerability in Microsoft SharePoint allowing Remote Code Execution

 

Office 365 (2 Vulnerabilities)

Severity level: Important
VUL-2024-38021 Vulnerability in Microsoft Office allowing Remote Code Execution
Severity level: Moderate
VUL-2024-38020 Vulnerability in Microsoft Outlook allowing Spoofing

 

Microsoft Dynamics 365 (on-premises)

Severity level: Important
VUL-2024-30061 Vulnerability in Microsoft Dynamics 365 (On-Premises) allowing Information Disclosure

 

Microsoft Defender for IoT (1 Vulnerability)

Severity level: Important
VUL-2024-38089 Vulnerability in Microsoft Defender for IoT allowing Elevation of Privilege

 

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.