Thursday, July 4, 2024

59 CVEs primed for Microsoft’s March Patch Tuesday – Sophos Information

On Tuesday Microsoft launched 59 CVEs, together with 41 for Home windows. A exceptional 20 different product teams or instruments are additionally affected. Of the CVEs addressed, simply two are thought of Vital in severity by Microsoft, each in Home windows (particularly, in Hyper-V).

At patch time, not one of the points has been publicly disclosed, or is understood to be below energetic exploit within the wild. Six of the important-severity vulnerabilities in Home windows are by the corporate’s estimation extra more likely to be exploited within the subsequent 30 days. 5 of the problems addressed are amenable to detection by Sophos protections, and we embody data on these in a desk under.

Along with these patches the discharge included advisory data on 4 patches associated to the Edge browser; three of these CVEs have been assigned by the Chrome workforce, not Microsoft. (Extra on Microsoft’s Edge patch, CVE-2024-26167, in a minute.) There’s additionally one Necessary-severity subject, CVE-2023-28746, for which advisory data is given this month.

We don’t embody advisories within the CVE counts and graphics under, however we offer data on all of them in an appendix on the finish of the article. We’re as normal together with on the finish of this put up three different appendices itemizing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product household.

By the Numbers

  • Complete Microsoft CVEs (excluding Edge): 59
  • Complete Edge / Chrome points coated in replace: 4
  • Complete non-Microsoft CVEs coated in replace: 1
  • Publicly disclosed: 0
  • Exploited: 0
  • Severity
    • Vital: 2
    • Necessary: 57
    • Elevation of Privilege: 25
    • Distant Code Execution: 18
    • Denial of Service: 6
    • Data Disclosure: 5
    • Safety Characteristic Bypass: 2
    • Spoofing: 2
    • Tampering: 1

A bar chart showing the distributing of March 2024 Microsoft patches by severity, organized by impact; information replicated in text

Determine 1: And identical to that, 2024 ties 2023’s whole output of tampering CVEs… at one. Extra on CVE-2024-26185 in a minute

Merchandise

  • Home windows: 41 (together with one shared with .NET and Visible Studio)
  • Azure: 4 (together with one shared with Log Analytics Agent, OMI, OMS, and SCOM)
  • Visible Studio: 3 (together with one shared with .NET and one shared with .NET and Home windows)
  • .NET: 2 (together with one shared with Visible Studio and one shared with Visible Studio and Home windows)
  • OMI (Open Administration Infrastructure): 2 (together with one shared with Azure, Log Analytics Agent, OMS, and SCOM; and one shared with SCOM)
  • SCOM (System Middle Operations Supervisor): 2 (together with one shared with Azure, Log Analytics Agent, OMI, and OMS; and one shared with OMI
  • Authenticator: 1
  • Defender: 1
  • Dynamics 365: 1
  • Change: 1
  • Intune: 1
  • Log Analytics Agent: 1 (shared with Azure, OMI, OMS, and SCOM)
  • Workplace (365 on-premises): 1
  • OMS (Operations Administration Suite Agent for Linux): 1 (shared with Azure, OMI, and SCOM)
  • Outlook: 1
  • SharePoint: 1
  • Skype: 1
  • SONiC (Software program for Open Networking within the Cloud): 1
  • SQL: 1
  • Groups: 1

A bar chart showing the distribution of March 2024 Microsoft patches by product / tool family; information is replicated in text

Determine 2: There’s one thing for everybody, as twenty instruments or product teams are touched by the March Patch Tuesday angel

Notable March updates

Along with the problems mentioned above, a number of particular objects benefit consideration.

CVE-2024-26185

Home windows Compressed Folder Tampering Vulnerability

One of many six points Microsoft believes extra more likely to be exploited within the subsequent 30 days, this vulnerability impacts the ever present 7zip. Minimal person interplay is required, most probably through electronic mail (during which the attacker sends a specifically crafted file and convinces the person to open it) or through the online. This patch applies solely to Win11 22H2 and Win11 23H2.

CVE-2024-21334

Open Administration Infrastructure (OMI) Distant Code Execution Vulnerability

Sporting the month’s highest CVSS rating (9.8 base) and but not more likely to be exploited within the subsequent 30 days as judged by Microsoft, this RCE applies to not simply OMI however to SCOM (System Middle Operations Supervisor) 2019 and 2022 as properly. If exploited, a unauthenticated distant attacker might entry the OMI occasion through the web and ship specifically crafted requests to set off a use-after-free vulnerability. (If patching’s not a direct possibility, Linux machines that don’t want community listening can disable their incoming OMI ports by means of mitigation.)

CVE-2024-21421

Azure SDK Spoofing Vulnerability

Verify the date of your final deployment: Was it previous to October 19, 2023? If that’s the case, you’ll have to manually replace to Azure Core Construct 1.29.5 or greater. (For comfort, Azure SDK’s GitHub is out there right here.) These with deployments after that date already obtained the repair mechanically.

CVE-2024-21448

Microsoft Groups for Android Data Disclosure

There are a selection of Android-related patches this month – Intune, Outlook, the Edge patch we’ll focus on under – however solely this one, an important-severity Groups subject, would require a visit to the Play Retailer. Exploitation would enable the attacker to learn information from the personal listing of the applying.

CVE-2024-26167

Microsoft Edge for Android Spoofing Vulnerability

As an Edge vulnerability, this one arrives with scant data from Microsoft, which within the post-IE period primarily takes its browser updates outdoors the Patch Tuesday cycle. As an Android vulnerability, it could be that Android customers will take this replace from different sources. What’s clear from Microsoft is that no matter it’s and whoever’s patching it, the patch is just not but out there, and that these involved ought to keep watch over the publicly posted CVE data for updates. Happily, with a 4.3 CVSS base rating, this thriller could be a tempest in a teapot.

A bar chart showing the distribution of 2024 patch severities, by impact; RCE leads the pack

Determine 3: March continues the development up to now in 2024 of lighter-than-usual patch masses. Thus far in 2024 there have been 179 patches launched within the regular second-Tuesday cadence, in contrast with 246 in 2023, 225 in 2022, 228 in 2021, and 266 in 2020

Sophos protections

CVE Sophos Intercept X/Endpoint IPS Sophos XGS Firewall
CVE-2024-21433 Exp/2421433-A Exp/2421433-A
CVE-2024-21437 Exp/2421437-A Exp/2421437-A
CVE-2024-26160 Exp/2426160-A Exp/2426160-A
CVE-2024-26170 Exp/2426170-A Exp/2426170-A
CVE-2024-26182 Exp/2426182-A Exp/2426182-A

 

As you’ll be able to each month, in the event you don’t need to wait to your system to tug down Microsoft’s updates itself, you’ll be able to obtain them manually from the Home windows Replace Catalog web site. Run the winver.exe device to find out which construct of Home windows 10 or 11 you’re operating, then obtain the Cumulative Replace bundle to your particular system’s structure and construct quantity.

Appendix A: Vulnerability Influence and Severity

It is a checklist of March patches sorted by impression, then sub-sorted by severity. Every checklist is additional organized by CVE.

Elevation of Privilege (25 CVEs)

Necessary severity
CVE-2024-21330 Open Administration Infrastructure (OMI) Elevation of Privilege Vulnerability
CVE-2024-21390 Microsoft Authenticator Elevation of Privilege Vulnerability
CVE-2024-21400 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVE-2024-21418 Software program for Open Networking within the Cloud (SONiC) Elevation of Privilege Vulnerability
CVE-2024-21431 Hypervisor-Protected Code Integrity (HVCI) Safety Characteristic Bypass Vulnerability
CVE-2024-21432 Home windows Replace Stack Elevation of Privilege Vulnerability
CVE-2024-21433 Home windows Print Spooler Elevation of Privilege Vulnerability
CVE-2024-21434 Microsoft Home windows SCSI Class System File Elevation of Privilege Vulnerability
CVE-2024-21436 Home windows Installer Elevation of Privilege Vulnerability
CVE-2024-21437 Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2024-21439 Home windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-21442 Home windows USB Print Driver Elevation of Privilege Vulnerability
CVE-2024-21443 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21445 Home windows USB Print Driver Elevation of Privilege Vulnerability
CVE-2024-21446 NTFS Elevation of Privilege Vulnerability
CVE-2024-26165 Visible Studio Code Elevation of Privilege Vulnerability
CVE-2024-26169 Home windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2024-26170 Home windows Composite Picture File System (CimFS) Elevation of Privilege Vulnerability
CVE-2024-26173 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26176 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26178 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26182 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26199 Microsoft Workplace Elevation of Privilege Vulnerability
CVE-2024-26201 Microsoft Intune Linux Agent Elevation of Privilege Vulnerability
CVE-2024-26203 Azure Knowledge Studio Elevation of Privilege Vulnerability

 

Distant Code Execution (18 CVEs)

Vital severity
CVE-2024-21407 Home windows Hyper-V Distant Code Execution Vulnerability
Necessary severity
CVE-2024-21334 Open Administration Infrastructure (OMI) Distant Code Execution Vulnerability
CVE-2024-21411 Skype for Client Distant Code Execution Vulnerability
CVE-2024-21426 Microsoft SharePoint Server Distant Code Execution Vulnerability
CVE-2024-21429 Home windows USB Hub Driver Distant Code Execution Vulnerability
CVE-2024-21430 Home windows USB Connected SCSI (UAS) Protocol Distant Code Execution Vulnerability
CVE-2024-21435 Home windows OLE Distant Code Execution Vulnerability
CVE-2024-21440 Microsoft ODBC Driver Distant Code Execution Vulnerability
CVE-2024-21441 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-21444 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-21450 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-21451 Microsoft ODBC Driver Distant Code Execution Vulnerability
CVE-2024-26159 Microsoft ODBC Driver Distant Code Execution Vulnerability
CVE-2024-26161 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-26162 Microsoft ODBC Driver Distant Code Execution Vulnerability
CVE-2024-26164 Microsoft Django Backend for SQL Server Distant Code Execution Vulnerability
CVE-2024-26166 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-26198 Microsoft Change Server Distant Code Execution Vulnerability

 

Denial of Service (6 CVEs)

Vital severity
CVE-2024-21408 Home windows Hyper-V Denial of Service Vulnerability
Necessary severity
CVE-2024-21392 .NET and Visible Studio Denial of Service Vulnerability
CVE-2024-21438 Microsoft AllJoyn API Denial of Service Vulnerability
CVE-2024-26181 Home windows Kernel Denial of Service Vulnerability
CVE-2024-26190 Microsoft QUIC Denial of Service Vulnerability
CVE-2024-26197 Home windows Requirements-Primarily based Storage Administration Service Denial of Service Vulnerability

 

data Disclosure (5 CVEs)

Necessary severity
CVE-2024-21448 Microsoft Groups for Android Data Disclosure
CVE-2024-26160 Home windows Cloud Information Mini Filter Driver Data Disclosure Vulnerability
CVE-2024-26174 Home windows Kernel Data Disclosure Vulnerability
CVE-2024-26177 Home windows Kernel Data Disclosure Vulnerability
CVE-2024-26204 Outlook for Android Data Disclosure Vulnerability

 

Safety Characteristic Bypass (2 CVEs)

Necessary severity
CVE-2024-20671 Microsoft Defender Safety Characteristic Bypass Vulnerability
CVE-2024-21427 Home windows Kerberos Safety Characteristic Bypass Vulnerability

 

Spoofing (2 CVEs)

Necessary severity
CVE-2024-21419 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
CVE-2024-21421 Azure SDK Spoofing Vulnerability

 

Tampering (1 CVE)

Necessary severity
CVE-2024-26185 Home windows Compressed Folder Tampering Vulnerability

 

 

Appendix B: Exploitability

It is a checklist of the March CVEs judged by Microsoft to be extra more likely to be exploited within the wild inside the first 30 days post-release. The checklist is organized by CVE.

Exploitation extra possible inside the subsequent 30 days
CVE-2024-21433 Home windows Print Spooler Elevation of Privilege Vulnerability
CVE-2024-21437 Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2024-26160 Home windows Cloud Information Mini Filter Driver Data Disclosure Vulnerability
CVE-2024-26170 Home windows Composite Picture File System (CimFS) Elevation of Privilege Vulnerability
CVE-2024-26182 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26185 Home windows Compressed Folder Tampering Vulnerability

 

 

Appendix C: Merchandise Affected

It is a checklist of March’s patches sorted by product household, then sub-sorted by severity. Every checklist is additional organized by CVE. Patches which might be shared amongst a number of product households are listed a number of occasions, as soon as for every product household.

Home windows (41 CVEs)

Vital severity
CVE-2024-21407 Home windows Hyper-V Distant Code Execution Vulnerability
CVE-2024-21408 Home windows Hyper-V Denial of Service Vulnerability
Necessary severity
CVE-2024-21427 Home windows Kerberos Safety Characteristic Bypass Vulnerability
CVE-2024-21429 Home windows USB Hub Driver Distant Code Execution Vulnerability
CVE-2024-21430 Home windows USB Connected SCSI (UAS) Protocol Distant Code Execution Vulnerability
CVE-2024-21431 Hypervisor-Protected Code Integrity (HVCI) Safety Characteristic Bypass Vulnerability
CVE-2024-21432 Home windows Replace Stack Elevation of Privilege Vulnerability
CVE-2024-21433 Home windows Print Spooler Elevation of Privilege Vulnerability
CVE-2024-21434 Microsoft Home windows SCSI Class System File Elevation of Privilege Vulnerability
CVE-2024-21435 Home windows OLE Distant Code Execution Vulnerability
CVE-2024-21436 Home windows Installer Elevation of Privilege Vulnerability
CVE-2024-21437 Home windows Graphics Element Elevation of Privilege Vulnerability
CVE-2024-21438 Microsoft AllJoyn API Denial of Service Vulnerability
CVE-2024-21439 Home windows Telephony Server Elevation of Privilege Vulnerability
CVE-2024-21440 Microsoft ODBC Driver Distant Code Execution Vulnerability
CVE-2024-21441 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-21442 Home windows USB Print Driver Elevation of Privilege Vulnerability
CVE-2024-21443 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21444 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-21445 Home windows USB Print Driver Elevation of Privilege Vulnerability
CVE-2024-21446 NTFS Elevation of Privilege Vulnerability
CVE-2024-21450 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-21451 Microsoft ODBC Driver Distant Code Execution Vulnerability
CVE-2024-26159 Microsoft ODBC Driver Distant Code Execution Vulnerability
CVE-2024-26160 Home windows Cloud Information Mini Filter Driver Data Disclosure Vulnerability
CVE-2024-26161 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-26162 Microsoft ODBC Driver Distant Code Execution Vulnerability
CVE-2024-26166 Microsoft WDAC OLE DB supplier for SQL Server Distant Code Execution Vulnerability
CVE-2024-26169 Home windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2024-26170 Home windows Composite Picture File System (CimFS) Elevation of Privilege Vulnerability
CVE-2024-26173 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26174 Home windows Kernel Data Disclosure Vulnerability
CVE-2024-26176 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26177 Home windows Kernel Data Disclosure Vulnerability
CVE-2024-26178 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26181 Home windows Kernel Denial of Service Vulnerability
CVE-2024-26182 Home windows Kernel Elevation of Privilege Vulnerability
CVE-2024-26185 Home windows Compressed Folder Tampering Vulnerability
CVE-2024-26190 Microsoft QUIC Denial of Service Vulnerability
CVE-2024-26197 Home windows Requirements-Primarily based Storage Administration Service Denial of Service Vulnerability

 

Azure (4 CVEs)

Necessary severity
CVE-2024-21330 Open Administration Infrastructure (OMI) Elevation of Privilege Vulnerability
CVE-2024-21400 Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
CVE-2024-21421 Azure SDK Spoofing Vulnerability
CVE-2024-26203 Azure Knowledge Studio Elevation of Privilege Vulnerability

 

Visible Studio (3 CVEs)

Necessary severity
CVE-2024-21392 .NET and Visible Studio Denial of Service Vulnerability
CVE-2024-26165 Visible Studio Code Elevation of Privilege Vulnerability
CVE-2024-26190 Microsoft QUIC Denial of Service Vulnerability

 

.NET (2 CVEs)

Necessary severity
CVE-2024-21392 .NET and Visible Studio Denial of Service Vulnerability
CVE-2024-26190 Microsoft QUIC Denial of Service Vulnerability

 

OMI (2 CVEs)

Necessary severity
CVE-2024-21330 Open Administration Infrastructure (OMI) Elevation of Privilege Vulnerability
CVE-2024-21334 Open Administration Infrastructure (OMI) Distant Code Execution Vulnerability

 

SCOM (2 CVEs)

Necessary severity
CVE-2024-21330 Open Administration Infrastructure (OMI) Elevation of Privilege Vulnerability
CVE-2024-21334 Open Administration Infrastructure (OMI) Distant Code Execution Vulnerability

 

Authenticator (1 CVE)

Necessary severity
CVE-2024-21390 Microsoft Authenticator Elevation of Privilege Vulnerability

 

Defender (1 CVE)

Necessary severity
CVE-2024-20671 Microsoft Defender Safety Characteristic Bypass Vulnerability

 

Dynamics 365 (1 CVE)

Necessary severity
CVE-2024-21419 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 

Change (1 CVE)

Necessary severity
CVE-2024-26198 Microsoft Change Server Distant Code Execution Vulnerability

 

Intune (1 CVE)

Necessary severity
CVE-2024-26201 Microsoft Intune Linux Agent Elevation of Privilege Vulnerability

 

Legislation Analytics Agent (1 CVE)

Necessary severity
CVE-2024-21330 Open Administration Infrastructure (OMI) Elevation of Privilege Vulnerability

 

Workplace (1 CVE)

Necessary severity
CVE-2024-26199 Microsoft Workplace Elevation of Privilege Vulnerability

 

OMS (1 CVE)

Necessary severity
CVE-2024-21330 Open Administration Infrastructure (OMI) Elevation of Privilege Vulnerability

 

Outlook (1 CVE)

Necessary severity
CVE-2024-26204 Outlook for Android Data Disclosure Vulnerability

 

SharePoint (1 CVE)

Necessary severity
CVE-2024-21426 Microsoft SharePoint Server Distant Code Execution Vulnerability

 

Skype (1 CVE)

Necessary severity
CVE-2024-21411 Skype for Client Distant Code Execution Vulnerability

 

SONiC (1 CVE)

Necessary severity
CVE-2024-21418 Software program for Open Networking within the Cloud (SONiC) Elevation of Privilege Vulnerability

 

SQL (1 CVE)

Necessary severity
CVE-2024-26164 Microsoft Django Backend for SQL Server Distant Code Execution Vulnerability

 

Groups for Android (1 CVE)

Necessary severity
CVE-2024-21448 Microsoft Groups for Android Data Disclosure

 

Appendix D: Advisories and Different Merchandise

It is a checklist of advisories and data on different related CVEs within the March Microsoft launch, sorted by product.

Related to Edge / Chromium (4 CVEs)

CVE-2024-2173 Chromium: CVE-2024-2173 Out of bounds reminiscence entry in V8
CVE-2024-2174 Chromium: CVE-2024-2174 Inappropriate implementation in V8
CVE-2024-2176 Chromium: CVE-2024-2176 Use after free in FedCM
CVE-2024-26167 Microsoft Edge for Android Spoofing Vulnerability

 

Related to Home windows (non-Microsoft launch) (one CVE)

CVE-2023-28746 Intel: CVE-2023-28746 Register File Knowledge Sampling (RFDS)

 

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles