September Patch Tuesday addresses 79 CVEs

Credit to Author: Angela Gunn| Date: Thu, 12 Sep 2024 08:10:26 +0000

Microsoft on Tuesday released 79 patches touching eleven product families. Seven of those issues, affecting Azure, SharePoint, and Windows, are considered by Microsoft to be of critical severity. At press time, three of the issues addressed are known to be under exploit in the wild, with a fourth issue not itself under exploit, but intertwined with issues that are. (For details on this unusual situation, please see the “Notable September updates” section below.) Microsoft assesses that 11 CVEs, all in Windows, are by the company’s estimation more likely to be exploited in the next 30 days. Eight of this month’s issues are amenable to detection by Sophos protections, and we include information on those in a table below.

In addition to these patches, the release includes advisory information on three CVEs addressed by patches from Adobe, affecting Reader and ColdFusion; one of the Reader vulnerabilities CVE-2024-41869) is a critical-severity use-after-free with a workable exploit already available in the wild. We are as always including at the end of this post additional appendices listing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product family.

By the numbers

  • Total CVEs: 79
  • Total Adobe advisories covered in update: 3
  • Publicly disclosed: 1
  • Exploited detected: 4*
  • Severity
    • Critical: 7
    • Important: 71
    • Moderate: 1
  • Impact
    • Elevation of privilege: 30
    • Remote code execution: 23
    • Information disclosure: 11
    • Denial of service: 8
    • Security feature bypass: 4
    • Spoofing: 3
  • CVSS base score 9.0 or greater: 2
  • CVSS base score 8.0 or greater: 24

* For information on why we count CVE-2024-43491 as this month’s fourth exploited-detected CVE despite the CVE itself not being detected as under exploit, please see the “Notable September updates” section below.

A bar chart displaying the severity of vulnerabilities addressed in Microsoft's September 2024 patch release. Information is duplicated in the article text.

Figure 1: This month’s critical-severity patches include one for which exploitation has already been detected, and two more for which exploitation is more likely within the next 30 days

Product families

  • Windows: 47
  • SQL Server: 13
  • Azure: 6
  • SharePoint: 5
  • Office: 4
  • 365: 2
  • Dynamics 365: 2
  • Microsoft AutoUpdate (MAU) for Mac: 1
  • Outlook for iOS: 1
  • Power BI: 1
  • Visio: 1

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect.

A bar chart displaying the product families affected by vulnerabilities addressed in Microsoft's September 2024 patch release. Information is duplicated in the article text.

Figure 2: Though Windows as usual leads the list of affected product families, a collection of Native Scoring issues in SQL Server contributed to that product taking 13 patches of its own

Notable September updates

In addition to the issues discussed above, a number of specific items merit attention.

CVE-2024-38217 — Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-43492 — Windows Mark of the Web Security Feature Bypass Vulnerability

There are patches for two Mark of the Web vulnerabilities this month, and both are either currently under active exploit in the wild (CVE-2024-38217) or judged by Microsoft as more likely to be exploited within the next 30 days (CVE-2024-43492). The latter bug was found in-house at Microsoft and is considered to be of moderate severity. The former, however, was disclosed responsibly by Elastic Security’s Joe Desimone, who has posted about the discovery and the reporting process, and which may be of interest to those who follow issues around code-signing certificates. The bug affects all versions of Windows including Win 11H24 and is of important severity.

CVE-2024-38014 — Windows Installer Elevation of Privilege Vulnerability

This issue is under active exploit in the wild. It affects all versions of Windows including Win 11H24.

CVE-2024-43491 – Microsoft Windows Update Remote Code Execution Vulnerability

The good news is that this issue affects only certain operational components of Windows 10, version 1507 (first released in July 2015); only two versions of that build, Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB, are still under support. The bad news, for those still running either of those versions, is that critical-severity remote code execution issue, which carries a 9.8 CVE base score, occurs in… the Windows Servicing Stack. It’s a fascinating issue for those who care about such things — rather than a coding error per se, Microsoft explains that the build version numbers themselves “crossed into a range that triggered a code defect in the Windows 10 (version 1507) servicing stack that handles the applicability of Optional Components. As a result, any Optional Component that was serviced with updates released since March 12, 2024 (KB5035858) was detected as “not applicable” by the servicing stack and was reverted to its RTM version.” If this issue is applicable to your estate, it is recommended that you closely read and follow the information Microsoft provides in KB5043083, as the patch sequence one must follow is precise. That page also includes a list of the specific optional components affected, which may help clarify your exposure.

[29 CVEs] — Windows 11 24H2 patches

Even though Windows 11 24H2 is not yet in general release, just over a third of this month’s patches affect that platform, including two (CVE-2024-38014, CVE-2024-38217) for which exploitation has already been detected in the wild. Users of the new Copilot+ PCs who do not ingest their patches automatically should be sure to update their devices.

[0 CVEs] — .NET, Visual Studio, Edge / Chromium, non-iOS Outlook

A rare month of respite for .NET and Visual Studio, with no patches released for those families. Nor are there any this time around related to Edge, or to Outlook for platforms other than Apple’s.

A bar chart displaying the severity of vulnerabilities addressed in Microsoft's 2024 patch releases so far.

Figure 3: Despite the predominance of EoP issues in recent months, RCE continues to lead the pack as we reach the three-quarter mark for 2024.

Sophos protections

 

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows 10 or 11 you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of September patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.

Elevation of Privilege (30 CVEs)

Critical severity
CVE-2024-38194Azure Web Apps Elevation of Privilege Vulnerability
CVE-2024-38216Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2024-38220Azure Stack Hub Elevation of Privilege Vulnerability
Important severity
CVE-2024-37341Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-37965Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-37980Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-38014Windows Installer Elevation of Privilege Vulnerability
CVE-2024-38046PowerShell Elevation of Privilege Vulnerability
CVE-2024-38188Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2024-38225Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2024-38237Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38238Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38239Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-38240Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-38241Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38242Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38243Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38244Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38245Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38246Win32k Elevation of Privilege Vulnerability
CVE-2024-38247Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38248Windows Storage Elevation of Privilege Vulnerability
CVE-2024-38249Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38250Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38252Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-38253Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-43457Windows Setup and Deployment Elevation of Privilege Vulnerability
CVE-2024-43465Microsoft Excel Elevation of Privilege Vulnerability
CVE-2024-43470Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2024-43492Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

 

Remote Code Execution (23 CVEs)

Critical severity
CVE-2024-38018Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38119Windows Network Address Translation (NAT) Remote Code Execution Vulnerability
CVE-2024-43464Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43491Microsoft Windows Update Remote Code Execution Vulnerability
Important severity
CVE-2024-21416Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-26186Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-26191Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37335Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37338Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37339Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37340Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-38045Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-38227Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38228Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38259Microsoft Management Console Remote Code Execution Vulnerability
CVE-2024-38260Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38263Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43454Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43463Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-43467Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43469Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-43479Microsoft Power Automate Desktop Remote Code Execution Vulnerability
CVE-2024-43495Windows libarchive Remote Code Execution Vulnerability

 

Information Disclosure (11 CVEs)

Important severity
CVE-2024-37337Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37342Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37966Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-38254Windows Authentication Information Disclosure Vulnerability
CVE-2024-38256Windows Kernel-Mode Driver Information Disclosure Vulnerability
CVE-2024-38257Microsoft AllJoyn API Information Disclosure Vulnerability
CVE-2024-38258Windows Remote Desktop Licensing Service Information Disclosure Vulnerability
CVE-2024-43458Windows Networking Information Disclosure Vulnerability
CVE-2024-43474Microsoft SQL Server Information Disclosure Vulnerability
CVE-2024-43475Microsoft Windows Admin Center Information Disclosure Vulnerability
CVE-2024-43482Microsoft Outlook for iOS Information Disclosure Vulnerability

 

Denial of Service (8 CVEs)

Important severity
CVE-2024-38230Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVE-2024-38231Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVE-2024-38232Windows Networking Denial of Service Vulnerability
CVE-2024-38233Windows Networking Denial of Service Vulnerability
CVE-2024-38234Windows Networking Denial of Service Vulnerability
CVE-2024-38235Windows Hyper-V Denial of Service Vulnerability
CVE-2024-38236DHCP Server Service Denial of Service Vulnerability
CVE-2024-43466Microsoft SharePoint Server Denial of Service Vulnerability

 

Security Feature Bypass (4 CVEs)

Important severity
CVE-2024-30073Windows Security Zone Mapping Security Feature Bypass Vulnerability
CVE-2024-38217Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-38226Microsoft Publisher Security Features Bypass Vulnerability
Moderate severity
CVE-2024-43487Windows Mark of the Web Security Feature Bypass Vulnerability

 

Spoofing (3 CVEs)

Important severity
CVE-2024-43455Windows Remote Desktop Licensing Service Spoofing Vulnerability
CVE-2024-43461Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43476Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 

Appendix B: Exploitability

This is a list of the September CVEs judged by Microsoft to be either under exploitation in the wild or more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE. In the case of CVE-2024-43491, the issue itself is not known to be under active exploit, but certain of the issues fixed by the rejected servicing-stack updates are, so we are choosing to include it on this list. (Please see the “Notable September updates” section above for context.)

Exploitation detected
CVE-2024-38014Windows Installer Elevation of Privilege Vulnerability
CVE-2024-38217Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-38226Microsoft Publisher Security Features Bypass Vulnerability
CVE-2024-43491Microsoft Windows Update Remote Code Execution Vulnerability
Exploitation more likely within the next 30 days
CVE-2024-38018Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38227Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38228Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38237Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38238Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38241Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38242Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38243Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38244Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38245Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38246Win32k Elevation of Privilege Vulnerability
CVE-2024-38247Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38249Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38252Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-38253Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-43457Windows Setup and Deployment Elevation of Privilege Vulnerability
CVE-2024-43461Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43464Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43487Windows Mark of the Web Security Feature Bypass Vulnerability

 

Appendix C: Products Affected

This is a list of September’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family.

Windows (47 CVEs)

Critical severity
CVE-2024-38119Windows Network Address Translation (NAT) Remote Code Execution Vulnerability
CVE-2024-43491Microsoft Windows Update Remote Code Execution Vulnerability
Important severity
CVE-2024-21416Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-30073Windows Security Zone Mapping Security Feature Bypass Vulnerability
CVE-2024-38014Windows Installer Elevation of Privilege Vulnerability
CVE-2024-38045Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-38046PowerShell Elevation of Privilege Vulnerability
CVE-2024-38217Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-38230Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVE-2024-38231Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVE-2024-38232Windows Networking Denial of Service Vulnerability
CVE-2024-38233Windows Networking Denial of Service Vulnerability
CVE-2024-38234Windows Networking Denial of Service Vulnerability
CVE-2024-38235Windows Hyper-V Denial of Service Vulnerability
CVE-2024-38236DHCP Server Service Denial of Service Vulnerability
CVE-2024-38237Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38238Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38239Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-38240Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-38241Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38242Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38243Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38244Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38245Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38246Win32k Elevation of Privilege Vulnerability
CVE-2024-38247Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38248Windows Storage Elevation of Privilege Vulnerability
CVE-2024-38249Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38252Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-38253Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-38254Windows Authentication Information Disclosure Vulnerability
CVE-2024-38256Windows Kernel-Mode Driver Information Disclosure Vulnerability
CVE-2024-38257Microsoft AllJoyn API Information Disclosure Vulnerability
CVE-2024-38258Windows Remote Desktop Licensing Service Information Disclosure Vulnerability
CVE-2024-38259Microsoft Management Console Remote Code Execution Vulnerability
CVE-2024-38260Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38263Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43454Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43455Windows Remote Desktop Licensing Service Spoofing Vulnerability
CVE-2024-43457Windows Setup and Deployment Elevation of Privilege Vulnerability
CVE-2024-43458Windows Networking Information Disclosure Vulnerability
CVE-2024-43461Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43467Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43475Microsoft Windows Admin Center Information Disclosure Vulnerability
CVE-2024-43495Windows libarchive Remote Code Execution Vulnerability
Moderate severity
CVE-2024-43487Windows Mark of the Web Security Feature Bypass Vulnerability

 

SQL Server (13 CVEs)

Important severity
CVE-2024-26186Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-26191Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37335Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37337Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37338Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37339Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37340Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37341Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-37342Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37965Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-37966Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37980Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-43474Microsoft SQL Server Information Disclosure Vulnerability

 

Azure (6 CVEs)

Critical severity
CVE-2024-38194Azure Web Apps Elevation of Privilege Vulnerability
CVE-2024-38216Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2024-38220Azure Stack Hub Elevation of Privilege Vulnerability
Important severity
CVE-2024-38188Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2024-43469Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-43470Azure Network Watcher VM Agent Elevation of Privilege Vulnerability

 

SharePoint (5 CVEs)

Critical severity
CVE-2024-38018Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43464Microsoft SharePoint Server Remote Code Execution Vulnerability
Important severity
CVE-2024-38227Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38228Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43466Microsoft SharePoint Server Denial of Service Vulnerability

 

Office (4 CVE)

Important severity
CVE-2024-38226Microsoft Publisher Security Features Bypass Vulnerability
CVE-2024-38250Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-43463Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-43465Microsoft Excel Elevation of Privilege Vulnerability

 

365 (2 CVE)

Important severity
CVE-2024-43463Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-43465Microsoft Excel Elevation of Privilege Vulnerability

 

Dynamics 365 (2 CVE)

Important severity
CVE-2024-38225Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2024-43476Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 

Microsoft AutoUpdate (MAU) for Mac (1 CVE)

Important severity
CVE-2024-43492Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

 

Outlook for iOS (1 CVE)

Important severity
CVE-2024-43482Microsoft Outlook for iOS Information Disclosure Vulnerability

 

PowerBI (1 CVE)

Important severity
CVE-2024-43479Microsoft Power Automate Desktop Remote Code Execution Vulnerability

 

Visio (1 CVE)

Important severity
CVE-2024-43463Microsoft Office Visio Remote Code Execution Vulnerability

 

Appendix D: Advisories and Other Products

This is a list of advisories and information on other relevant CVEs in the September release, sorted by product.

Relevant to Adobe (non-Microsoft release) (3 CVEs)

CVE-2024-41869APSB24-70Use After Free (CWE-416)
CVE-2024-41874APSB24-71Deserialization of Untrusted Data (CWE-502)
CVE-2024-39420APSB24-70Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)

 

 

http://feeds.feedburner.com/sophos/dgdY