Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface, cause denial of service, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Netlogon can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in NT OS Kernel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
- A tampering vulnerability in Windows Remote Desktop Services can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft WDAC OLE DB provider for SQL Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft ActiveX Data Objects can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Windows Kernel can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Remote Registry Service can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Management Console can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Telephony Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A spoofing vulnerability in Windows Secure Channel can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Windows Remote Desktop Licensing Service can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Windows MSHTML Platform can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Windows Resume Extensible Firmware Interface can be exploited remotely to bypass security restrictions.
- A denial of service vulnerability in Windows Online Certificate Status Protocol (OCSP) Server can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
- A denial of service vulnerability in BranchCache can be exploited remotely to cause denial of service.
- A denial of service vulnerability in Microsoft Simple Certificate Enrollment Protocol can be exploited remotely to cause denial of service.
- An elevation of privilege vulnerability in Windows Ancillary Function Driver for WinSock can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Internet Small Computer Systems Interface (iSCSI) can be exploited remotely to cause denial of service.
- An information disclosure vulnerability in Windows Kerberos can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in BitLocker can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Microsoft Windows Storage Port Driver can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
Первичный источник обнаружения
- CVE-2024-38124
CVE-2024-43553
CVE-2024-43608
CVE-2024-43535
CVE-2024-43501
CVE-2024-43456
CVE-2024-43519
CVE-2024-43517
CVE-2024-43567
CVE-2024-43592
CVE-2024-43512
CVE-2024-43520
CVE-2024-43593
CVE-2024-43564
CVE-2024-43611
CVE-2024-43532
CVE-2024-38265
CVE-2024-43572
CVE-2024-43453
CVE-2024-43518
CVE-2024-43556
CVE-2024-43550
CVE-2024-43583
CVE-2024-38262
CVE-2024-43521
CVE-2024-43573
CVE-2024-43534
CVE-2024-37982
CVE-2024-43545
CVE-2024-43549
CVE-2024-37979
CVE-2024-43570
CVE-2024-37976
CVE-2024-38261
CVE-2024-43506
CVE-2024-43541
CVE-2024-43563
CVE-2024-43599
CVE-2024-37983
CVE-2024-38212
CVE-2024-43607
CVE-2024-43509
CVE-2024-43544
CVE-2024-43515
CVE-2024-43547
CVE-2024-43513
CVE-2024-38149
CVE-2024-43560
CVE-2024-43514
CVE-2024-43589
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-Server-2008
Список CVE
- CVE-2024-38124 critical
- CVE-2024-43553 high
- CVE-2024-43608 critical
- CVE-2024-43535 high
- CVE-2024-43501 critical
- CVE-2024-43456 high
- CVE-2024-43519 critical
- CVE-2024-43517 critical
- CVE-2024-43567 critical
- CVE-2024-43592 critical
- CVE-2024-43512 critical
- CVE-2024-43520 warning
- CVE-2024-43593 critical
- CVE-2024-43564 critical
- CVE-2024-43611 critical
- CVE-2024-43532 critical
- CVE-2024-38265 critical
- CVE-2024-43572 critical
- CVE-2024-43453 critical
- CVE-2024-43518 critical
- CVE-2024-43556 critical
- CVE-2024-43550 high
- CVE-2024-43583 critical
- CVE-2024-38262 critical
- CVE-2024-43521 critical
- CVE-2024-43573 critical
- CVE-2024-43534 high
- CVE-2024-37982 critical
- CVE-2024-43545 critical
- CVE-2024-43549 critical
- CVE-2024-37979 critical
- CVE-2024-43570 high
- CVE-2024-37976 high
- CVE-2024-38261 critical
- CVE-2024-43506 critical
- CVE-2024-43541 critical
- CVE-2024-43563 critical
- CVE-2024-43599 critical
- CVE-2024-37983 high
- CVE-2024-38212 critical
- CVE-2024-43607 critical
- CVE-2024-43509 critical
- CVE-2024-43544 critical
- CVE-2024-43515 critical
- CVE-2024-43547 high
- CVE-2024-43513 high
- CVE-2024-38149 critical
- CVE-2024-43560 critical
- CVE-2024-43514 critical
- CVE-2024-43589 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!