Description
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface, cause denial of service, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Netlogon can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in NT OS Kernel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A tampering vulnerability in Windows Remote Desktop Services can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft ActiveX Data Objects can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Remote Registry Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Management Console can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Telephony Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Secure Channel can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Licensing Service can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Windows MSHTML Platform can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Resume Extensible Firmware Interface can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in Windows Online Certificate Status Protocol (OCSP) Server can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A denial of service vulnerability in BranchCache can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Microsoft Simple Certificate Enrollment Protocol can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Internet Small Computer Systems Interface (iSCSI) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Kerberos can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Microsoft Windows Storage Port Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
Original advisories
- CVE-2024-43553
- CVE-2024-43608
- CVE-2024-43535
- CVE-2024-43501
- CVE-2024-43456
- CVE-2024-43519
- CVE-2024-43517
- CVE-2024-43567
- CVE-2024-43592
- CVE-2024-43512
- CVE-2024-43520
- CVE-2024-43593
- CVE-2024-43564
- CVE-2024-43611
- CVE-2024-43532
- CVE-2024-38265
- CVE-2024-43572
- CVE-2024-43453
- CVE-2024-43518
- CVE-2024-43556
- CVE-2024-43550
- CVE-2024-43583
- CVE-2024-38262
- CVE-2024-43521
- CVE-2024-43573
- CVE-2024-43534
- CVE-2024-37982
- CVE-2024-43545
- CVE-2024-43549
- CVE-2024-37979
- CVE-2024-43570
- CVE-2024-37976
- CVE-2024-38261
- CVE-2024-43506
- CVE-2024-43541
- CVE-2024-43563
- CVE-2024-43599
- CVE-2024-37983
- CVE-2024-38212
- CVE-2024-43607
- CVE-2024-43509
- CVE-2024-43544
- CVE-2024-43515
- CVE-2024-43547
- CVE-2024-43513
- CVE-2024-38149
- CVE-2024-43560
- CVE-2024-43514
- CVE-2024-43589
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-Server-2008
CVE list
- CVE-2024-38124 critical
- CVE-2024-43553 high
- CVE-2024-43608 critical
- CVE-2024-43535 high
- CVE-2024-43501 critical
- CVE-2024-43456 high
- CVE-2024-43519 critical
- CVE-2024-43517 critical
- CVE-2024-43567 critical
- CVE-2024-43592 critical
- CVE-2024-43512 critical
- CVE-2024-43520 warning
- CVE-2024-43593 critical
- CVE-2024-43564 critical
- CVE-2024-43611 critical
- CVE-2024-43532 critical
- CVE-2024-38265 critical
- CVE-2024-43572 critical
- CVE-2024-43453 critical
- CVE-2024-43518 critical
- CVE-2024-43556 critical
- CVE-2024-43550 high
- CVE-2024-43583 critical
- CVE-2024-38262 critical
- CVE-2024-43521 critical
- CVE-2024-43573 critical
- CVE-2024-43534 high
- CVE-2024-37982 critical
- CVE-2024-43545 critical
- CVE-2024-43549 critical
- CVE-2024-37979 critical
- CVE-2024-43570 high
- CVE-2024-37976 high
- CVE-2024-38261 critical
- CVE-2024-43506 critical
- CVE-2024-43541 critical
- CVE-2024-43563 critical
- CVE-2024-43599 critical
- CVE-2024-37983 high
- CVE-2024-38212 critical
- CVE-2024-43607 critical
- CVE-2024-43509 critical
- CVE-2024-43544 critical
- CVE-2024-43515 critical
- CVE-2024-43547 high
- CVE-2024-43513 high
- CVE-2024-38149 critical
- CVE-2024-43560 critical
- CVE-2024-43514 critical
- CVE-2024-43589 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!