Kaspersky ID:
KLA70416
Дата обнаружения:
09/07/2024
Обновлено:
05/09/2024

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, cause denial of service, gain privileges, obtain sensitive information, spoof user interface, read local files.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Windows Distributed Transaction Coordinator can be exploited remotely to execute arbitrary code.
  2. A security feature bypass vulnerability in Secure Boot can be exploited remotely to bypass security restrictions.
  3. A denial of service vulnerability in Windows Remote Desktop Gateway (RD Gateway) can be exploited remotely to cause denial of service.
  4. A denial of service vulnerability in Windows iSCSI Service can be exploited remotely to cause denial of service.
  5. An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Windows Remote Access Connection Manager can be exploited remotely to gain privileges.
  7. An elevation of privilege vulnerability in Windows Filtering Platform can be exploited remotely to gain privileges.
  8. An elevation of privilege vulnerability in Windows Image Acquisition can be exploited remotely to gain privileges.
  9. An elevation of privilege vulnerability in Windows Workstation Service can be exploited remotely to gain privileges.
  10. A denial of service vulnerability in Windows Network Driver Interface Specification (NDIS) can be exploited remotely to cause denial of service.
  11. A denial of service vulnerability in Windows Layer-2 Bridge Network Driver can be exploited remotely to cause denial of service.
  12. A remote code execution vulnerability in Windows Layer-2 Bridge Network Driver can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Kernel Streaming WOW Thunk Service Driver can be exploited remotely to gain privileges.
  14. A security feature bypass vulnerability in Windows Cryptographic Services can be exploited remotely to bypass security restrictions.
  15. A denial of service vulnerability in Windows Remote Desktop Licensing Service can be exploited remotely to cause denial of service.
  16. A remote code execution vulnerability in Windows Remote Desktop Licensing Service can be exploited remotely to execute arbitrary code.
  17. An information disclosure vulnerability in Microsoft Windows Codecs Library can be exploited remotely to obtain sensitive information.
  18. A denial of service vulnerability in Windows Online Certificate Status Protocol (OCSP) Server can be exploited remotely to cause denial of service.
  19. A remote code execution vulnerability in DHCP Server Service can be exploited remotely to execute arbitrary code.
  20. A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
  21. A denial of service vulnerability in Windows Line Printer Daemon Service can be exploited remotely to cause denial of service.
  22. A security feature bypass vulnerability in Windows LockDown Policy (WLDP) can be exploited remotely to bypass security restrictions.
  23. An information disclosure vulnerability in Windows TCP/IP can be exploited remotely to obtain sensitive information.
  24. A spoofing vulnerability in Windows NTLM can be exploited remotely to spoof user interface.
  25. An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
  26. A remote code execution vulnerability in Microsoft Windows Performance Data Helper Library can be exploited remotely to execute arbitrary code.
  27. A remote code execution vulnerability in Windows Imaging Component can be exploited remotely to execute arbitrary code.
  28. A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
  29. A spoofing vulnerability in CERT/CC: CVE-2024-3596 RADIUS Protocol can be exploited remotely to spoof user interface.
  30. An elevation of privilege vulnerability in DCOM Remote Cross-Session Activation can be exploited remotely to gain privileges.
  31. A spoofing vulnerability in Windows Themes can be exploited remotely to spoof user interface.
  32. A denial of service vulnerability in Microsoft WS-Discovery can be exploited remotely to cause denial of service.
  33. A remote code execution vulnerability in Windows Fax Service can be exploited remotely to execute arbitrary code.
  34. An elevation of privilege vulnerability in Github: CVE-2024-39684 TenCent RapidJSON can be exploited remotely to gain privileges.
  35. An elevation of privilege vulnerability in Microsoft Windows Server Backup can be exploited remotely to gain privileges.
  36. A spoofing vulnerability in Windows MSHTML Platform can be exploited remotely to spoof user interface.
  37. An elevation of privilege vulnerability in PowerShell can be exploited remotely to gain privileges.
  38. An information disclosure vulnerability in Microsoft Message Queuing can be exploited remotely to obtain sensitive information.
  39. An elevation of privilege vulnerability in Windows Win32k can be exploited remotely to gain privileges.
  40. An elevation of privilege vulnerability in Windows Text Services Framework can be exploited remotely to gain privileges.
  41. An elevation of privilege vulnerability in Github: CVE-2024-38517 TenCent RapidJSON can be exploited remotely to gain privileges.
  42. An elevation of privilege vulnerability in Windows File Explorer can be exploited remotely to gain privileges.
  43. An information disclosure vulnerability in Windows Kernel can be exploited remotely to obtain sensitive information.
  44. A security feature bypass vulnerability in Windows Enroll Engine can be exploited remotely to bypass security restrictions.
  45. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  46. A remote code execution vulnerability in Xbox Wireless Adapter can be exploited remotely to execute arbitrary code.
  47. An elevation of privilege vulnerability in Windows Hyper-V can be exploited remotely to gain privileges.
  48. A remote code execution vulnerability in Microsoft Xbox can be exploited remotely to execute arbitrary code.
  49. An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
  50. A remote code execution vulnerability in Windows MultiPoint Services can be exploited remotely to execute arbitrary code.
  51. Unspecified Microsoft Windows can be exploited remotely to obtain sensitive information.
 
 

 

 

Первичный источник обнаружения

Эксплуатация

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Связанные продукты

Список CVE

  • CVE-2024-38049
    high
  • CVE-2024-37974
    high
  • CVE-2024-38015
    high
  • CVE-2024-35270
    high
  • CVE-2024-38085
    high
  • CVE-2024-37988
    high
  • CVE-2024-37972
    high
  • CVE-2024-30079
    high
  • CVE-2024-38034
    high
  • CVE-2024-38022
    high
  • CVE-2024-38050
    high
  • CVE-2024-38048
    high
  • CVE-2024-37984
    high
  • CVE-2024-38105
    high
  • CVE-2024-38053
    high
  • CVE-2024-38102
    high
  • CVE-2024-38054
    high
  • CVE-2024-30098
    high
  • CVE-2024-38071
    high
  • CVE-2024-37971
    high
  • CVE-2024-38077
    critical
  • CVE-2024-38010
    high
  • CVE-2024-38056
    high
  • CVE-2024-37987
    high
  • CVE-2024-38031
    high
  • CVE-2024-37986
    high
  • CVE-2024-38044
    high
  • CVE-2024-38079
    high
  • CVE-2024-37973
    high
  • CVE-2024-38058
    high
  • CVE-2024-37969
    high
  • CVE-2024-38027
    high
  • CVE-2024-38065
    high
  • CVE-2024-38055
    high
  • CVE-2024-38070
    high
  • CVE-2024-38064
    high
  • CVE-2024-30081
    high
  • CVE-2024-30071
    warning
  • CVE-2024-38028
    high
  • CVE-2024-38060
    high
  • CVE-2024-38074
    critical
  • CVE-2024-38051
    high
  • CVE-2024-38057
    high
  • CVE-2024-37970
    high
  • CVE-2024-3596
    high
  • CVE-2024-38011
    high
  • CVE-2024-28899
    high
  • CVE-2024-38061
    high
  • CVE-2024-38052
    high
  • CVE-2024-38030
    high
  • CVE-2024-38091
    high
  • CVE-2024-38104
    high
  • CVE-2024-39684
    high
  • CVE-2024-37989
    high
  • CVE-2024-38101
    high
  • CVE-2024-38025
    high
  • CVE-2024-38073
    high
  • CVE-2024-38067
    high
  • CVE-2024-38013
    high
  • CVE-2024-38019
    high
  • CVE-2024-38112
    high
  • CVE-2024-38033
    high
  • CVE-2024-37975
    high
  • CVE-2024-38068
    high
  • CVE-2024-38017
    high
  • CVE-2024-38066
    high
  • CVE-2024-38072
    high
  • CVE-2024-21417
    high
  • CVE-2024-38517
    high
  • CVE-2024-38100
    high
  • CVE-2024-38041
    high
  • CVE-2024-38069
    high
  • CVE-2024-38059
    high
  • CVE-2024-38078
    high
  • CVE-2024-38080
    high
  • CVE-2024-37977
    high
  • CVE-2024-38032
    high
  • CVE-2024-38043
    high
  • CVE-2024-38047
    high
  • CVE-2024-38062
    high
  • CVE-2024-26184
    high
  • CVE-2024-37978
    high
  • CVE-2024-30013
    high
  • CVE-2024-38076
    critical
  • CVE-2024-37981
    high
  • CVE-2024-37985
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.