Kaspersky ID:
KLA68915
Detect Date:
06/11/2024
Updated:
11/22/2024

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Perception Service can be exploited remotely to gain privileges.
  2. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  3. An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
  4. A remote code execution vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to execute arbitrary code.
  5. An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
  6. A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
  7. A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
  8. A denial of service vulnerability in Windows Themes can be exploited remotely to cause denial of service.
  9. An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
  10. A denial of service vulnerability in DNS protocol can be exploited remotely to cause denial of service.
  11. A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
  12. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  14. A remote code execution vulnerability in Windows Wi-Fi Driver can be exploited remotely to execute arbitrary code.
  15. An elevation of privilege vulnerability in Microsoft Streaming Service can be exploited remotely to gain privileges.
  16. An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
  17. An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
  18. A remote code execution vulnerability in Microsoft Speech Application Programming Interface (SAPI) can be exploited remotely to execute arbitrary code.
  19. An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
  20. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  21. A remote code execution vulnerability in Windows Distributed File System (DFS) can be exploited remotely to execute arbitrary code.
  22. An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
  23. A remote code execution vulnerability in Microsoft Event Trace Log File Parsing can be exploited remotely to execute arbitrary code.
  24. A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2023-50868
    warning
  • CVE-2024-30080
    critical
  • CVE-2024-30091
    critical
  • CVE-2024-35250
    critical
  • CVE-2024-30084
    high
  • CVE-2024-30078
    critical
  • CVE-2024-30090
    high
  • CVE-2024-30066
    high
  • CVE-2024-30062
    critical
  • CVE-2024-30093
    high
  • CVE-2024-30087
    critical
  • CVE-2024-30086
    critical
  • CVE-2024-30083
    critical
  • CVE-2024-30095
    critical
  • CVE-2024-30067
    high
  • CVE-2024-30077
    critical
  • CVE-2024-30082
    critical
  • CVE-2024-30094
    critical
  • CVE-2024-30063
    high
  • CVE-2024-30065
    high
  • CVE-2024-30070
    critical
  • CVE-2024-35265
    high
  • CVE-2024-30069
    warning
  • CVE-2024-30085
    critical
  • CVE-2024-30099
    high
  • CVE-2024-30068
    critical
  • CVE-2024-30088
    high
  • CVE-2024-30097
    critical
  • CVE-2024-30096
    high
  • CVE-2024-30064
    critical
  • CVE-2024-30076
    high
  • CVE-2024-30072
    critical
  • CVE-2024-30089
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.