Microsoft patches over 80 vulnerabilities in August patch, 9 critical, 6 actively exploited
Take action: This is another massive patch release, this time fixing actively exploited flaws, and flaws that will soon be actively exploited. Key products to prioritize for patching is Windows operating systems, Microsoft Outlook/Office, Microsoft Dynamics and check your Copilot instances (although Copilot is usually fixed from the cloud). While tedious, patching your Windows and Office is not too terrible. And you can always be optimistic and wait to be hacked.
Learn More
In August 2024, Microsoft's Patch Tuesday is addressing a total of 89 vulnerabilities, including six actively exploited zero-day vulnerabilities and nine critical flaws.
Actively exploited flaws
-
CVE-2024-38178 (CVSS score 7.5) - Scripting Engine Memory Corruption Vulnerability enabling remote code execution. Requires an authenticated user to click on a specially crafted URL in Microsoft Edge using Internet Explorer Mode, enabling an unauthenticated attacker to execute code remotely. Reported by AhnLab and South Korea’s National Cyber Security Center (NCSC), suggesting use in nation-state attacks.
-
CVE-2024-38193 (CVSS score 7.8) - Windows Ancillary Function Driver for WinSock enabling Elevation of privilege to SYSTEM. Locally exploitable, allows attackers to gain SYSTEM privileges on affected Windows systems. Exploited in the wild, with a high likelihood of use in malware attacks.
-
CVE-2024-38213 (CVSS score 6.5) - Windows Mark of the Web Security Feature Bypass Vulnerability enabling security feature bypass. Allows attackers to bypass SmartScreen and similar security measures by crafting malicious files. Actively exploited, often part of phishing campaigns.
-
CVE-2024-38106 (CVSS score 7) - Windows Kernel Elevation of Privilege Vulnerability enabling privilege escalation to SYSTEM. Requires winning a race condition, though it has been actively exploited. PExploitation in the wild despite the high complexity of the attack.
-
CVE-2024-38107 (CVSS score 7.8) - Windows Power Dependency Coordinator Elevation of Privilege Vulnerability enabling privilege escalation to SYSTEM. Local access is required; allows attackers to exploit the Power Dependency Coordinator. Exploited in the wild.
-
CVE-2024-38189 (CVSS score 8.8) - Microsoft Project Remote Code Execution Vulnerability enabling remote code execution. Requires users to open a specially crafted Microsoft Project file on systems where security features like macro blocking are disabled. Actively exploited, likely through phishing or compromised websites.
Publicly announced vulnerabilities that are expected to be exploited soon
-
CVE-2024-38199 (CVSS score 9.8) - Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability enabling remote code execution. An unauthenticated attacker could send a specially crafted print task to exploit the LPD service.
-
CVE-2024-21302 & CVE-2024-38202 (CVSS score 6.7 and 7.3 respectively) - Windows Secure Kernel Mode and Windows Update Stack Elevation of Privilege Vulnerabilities enablinge elevation of privilege. These were part of a talk at Black Hat 2024 discussing how attackers can use downgrade attacks to reintroduce old vulnerabilities in fully patched systems.
-
CVE-2024-38173 (CVSS score 6.7) is a zero-click vulnerability in Microsoft Outlook, aside from opening or previewing the email, it does not require the user to interact with the content of a malicious email thus allowing the adversary to gain foothold into the organization.
Vulnerabilities reported as critical by Microsoft
- CVE-2024-38109 (CVSS score 9.1) - Azure Health Bot Elevation of Privilege Vulnerability, affects a service used to develop healthcare-related chatbots. It allows an attacker to escalate privileges within the Azure Health Bot platform, potentially accessing cross-tenant resources, sensitive data, tokens and enabling lateral movement. By exploiting the "Data Connections" feature, researchers bypassed server-side mitigations, accessed Azure’s Internal Metadata Service (IMDS), and obtained access tokens. Microsoft has applied mitigations across all regions and services, and no customer action is required.
-
CVE-2024-38206 (CVSS score 6.5) - Microsoft Copilot Studio Information Disclosure Vulnerability It could allow attackers to exploit information disclosure flaws, potentially leading to the exposure of sensitive data.
-
CVE-2024-38166 (CVSS score 6.1) - Microsoft Dynamics 365 Cross-site Scripting Vulnerability. It allows attackers to execute cross-site scripting (XSS) attacks by injecting malicious scripts that can be executed in the context of the user’s browser. Could lead to unauthorized actions on behalf of users, compromising sensitive business data and user accounts.
-
CVE-2024-38140 (CVSS score 9.8) - Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability. Allowins attackers to execute arbitrary code remotely by sending specially crafted multicast packets to the affected systems. Could allow attackers to take full control of the affected systems, potentially leading to widespread network compromise.
-
CVE-2024-38160 & CVE-2024-38159 (both CVSS score 9.1) - Windows Network Virtualization Remote Code Execution Vulnerabilities. Both vulnerabilities could allow an attacker to execute arbitrary code remotely by exploiting flaws in the network virtualization process. Could lead to complete system compromise, allowing attackers to manipulate virtual networks and the data transmitted within them.
-
CVE-2022-3775 (CVSS score 7.1) - Redhat: grub2 Heap-based Out-of-Bounds Write Vulnerability. This flaw could be exploited during the boot process to bypass security controls. Allows attackers to potentially bypass Secure Boot, leading to unauthorized system access and compromise of the boot process.
-
CVE-2023-40547 (CVSS score 8.3) - Redhat: Shim Remote Code Execution Vulnerability. It allows remote code execution during the boot process, potentially leading to a complete security bypass. Could enable attackers to gain unauthorized control over systems by bypassing Secure Boot protections.
-
CVE-2024-38063 (CVSS score 9.8) - Windows TCP/IP Remote Code Execution Vulnerability. Could result in an attacker taking full control of the affected systems, enabling them to conduct further attacks or disrupt network operations. This vulnerability can be exploited remotely by sending specially crafted IPv6 packets to the target system. The flaw iImpacts all systems with IPv6 enabled. Firewalls dont' help since the flaw occurs as the packet is received, before any firewalls block it.
Full list of August patched flaws
| Product | CVE ID | CVE Title | Severity |
|---|---|---|---|
| .NET and Visual Studio | CVE-2024-38168 | .NET and Visual Studio Denial of Service Vulnerability | Important |
| .NET and Visual Studio | CVE-2024-38167 | .NET and Visual Studio Information Disclosure Vulnerability | Important |
| Azure Connected Machine Agent | CVE-2024-38162 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Important |
| Azure Connected Machine Agent | CVE-2024-38098 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Important |
| Azure CycleCloud | CVE-2024-38195 | Azure CycleCloud Remote Code Execution Vulnerability | Important |
| Azure Health Bot | CVE-2024-38109 | Azure Health Bot Elevation of Privilege Vulnerability | Critical |
| Azure IoT SDK | CVE-2024-38158 | Azure IoT SDK Remote Code Execution Vulnerability | Important |
| Azure IoT SDK | CVE-2024-38157 | Azure IoT SDK Remote Code Execution Vulnerability | Important |
| Azure Stack | CVE-2024-38108 | Azure Stack Hub Spoofing Vulnerability | Important |
| Azure Stack | CVE-2024-38201 | Azure Stack Hub Elevation of Privilege Vulnerability | Important |
| Line Printer Daemon Service (LPD) | CVE-2024-38199 | Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability | Important |
| Microsoft Bluetooth Driver | CVE-2024-38123 | Windows Bluetooth Driver Information Disclosure Vulnerability | Important |
| Microsoft Copilot Studio | CVE-2024-38206 | Microsoft Copilot Studio Information Disclosure Vulnerability | Critical |
| Microsoft Dynamics | CVE-2024-38166 | Microsoft Dynamics 365 Cross-site Scripting Vulnerability | Critical |
| Microsoft Dynamics | CVE-2024-38211 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Important |
| Microsoft Edge (Chromium-based) | CVE-2024-7256 | Chromium: CVE-2024-7256 Insufficient data validation in Dawn | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-7536 | Chromium: CVE-2024-7550 Type Confusion in V8 | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-6990 | Chromium: CVE-2024-6990 Uninitialized Use in Dawn | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-7255 | Chromium: CVE-2024-7255 Out of bounds read in WebTransport | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-7534 | Chromium: CVE-2024-7535 Inappropriate implementation in V8 | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-7532 | Chromium: CVE-2024-7533 Use after free in Sharing | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-7550 | Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-7535 | Chromium: CVE-2024-7536 Use after free in WebAudio | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-7533 | Chromium: CVE-2024-7534 Heap buffer overflow in Layout | Unknown |
| Microsoft Edge (Chromium-based) | CVE-2024-38218 | Microsoft Edge (HTML-based) Memory Corruption Vulnerability | Important |
| Microsoft Edge (Chromium-based) | CVE-2024-38219 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Moderate |
| Microsoft Edge (Chromium-based) | CVE-2024-38222 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | Unknown |
| Microsoft Local Security Authority Server (lsasrv) | CVE-2024-38118 | Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability | Important |
| Microsoft Local Security Authority Server (lsasrv) | CVE-2024-38122 | Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability | Important |
| Microsoft Office | CVE-2024-38200 | Microsoft Office Spoofing Vulnerability | Important |
| Microsoft Office | CVE-2024-38084 | Microsoft OfficePlus Elevation of Privilege Vulnerability | Important |
| Microsoft Office Excel | CVE-2024-38172 | Microsoft Excel Remote Code Execution Vulnerability | Important |
| Microsoft Office Excel | CVE-2024-38170 | Microsoft Excel Remote Code Execution Vulnerability | Important |
| Microsoft Office Outlook | CVE-2024-38173 | Microsoft Outlook Remote Code Execution Vulnerability | Important |
| Microsoft Office PowerPoint | CVE-2024-38171 | Microsoft PowerPoint Remote Code Execution Vulnerability | Important |
| Microsoft Office Project | CVE-2024-38189 | Microsoft Project Remote Code Execution Vulnerability | Important |
| Microsoft Office Visio | CVE-2024-38169 | Microsoft Office Visio Remote Code Execution Vulnerability | Important |
| Microsoft Streaming Service | CVE-2024-38134 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | Important |
| Microsoft Streaming Service | CVE-2024-38144 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | Important |
| Microsoft Streaming Service | CVE-2024-38125 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | Important |
| Microsoft Teams | CVE-2024-38197 | Microsoft Teams for iOS Spoofing Vulnerability | Important |
| Microsoft WDAC OLE DB provider for SQL | CVE-2024-38152 | Windows OLE Remote Code Execution Vulnerability | Important |
| Microsoft Windows DNS | CVE-2024-37968 | Windows DNS Spoofing Vulnerability | Important |
| Reliable Multicast Transport Driver (RMCAST) | CVE-2024-38140 | Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability | Critical |
| Windows Ancillary Function Driver for WinSock | CVE-2024-38141 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Important |
| Windows Ancillary Function Driver for WinSock | CVE-2024-38193 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Important |
| Windows App Installer | CVE-2024-38177 | Windows App Installer Spoofing Vulnerability | Important |
| Windows Clipboard Virtual Channel Extension | CVE-2024-38131 | Clipboard Virtual Channel Extension Remote Code Execution Vulnerability | Important |
| Windows Cloud Files Mini Filter Driver | CVE-2024-38215 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Important |
| Windows Common Log File System Driver | CVE-2024-38196 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Important |
| Windows Compressed Folder | CVE-2024-38165 | Windows Compressed Folder Tampering Vulnerability | Important |
| Windows Deployment Services | CVE-2024-38138 | Windows Deployment Services Remote Code Execution Vulnerability | Important |
| Windows DWM Core Library | CVE-2024-38150 | Windows DWM Core Library Elevation of Privilege Vulnerability | Important |
| Windows DWM Core Library | CVE-2024-38147 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | Important |
| Windows Initial Machine Configuration | CVE-2024-38223 | Windows Initial Machine Configuration Elevation of Privilege Vulnerability | Important |
| Windows IP Routing Management Snapin | CVE-2024-38114 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability | Important |
| Windows IP Routing Management Snapin | CVE-2024-38116 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability | Important |
| Windows IP Routing Management Snapin | CVE-2024-38115 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability | Important |
| Windows Kerberos | CVE-2024-29995 | Windows Kerberos Elevation of Privilege Vulnerability | Important |
| Windows Kernel | CVE-2024-38151 | Windows Kernel Information Disclosure Vulnerability | Important |
| Windows Kernel | CVE-2024-38133 | Windows Kernel Elevation of Privilege Vulnerability | Important |
| Windows Kernel | CVE-2024-38127 | Windows Hyper-V Elevation of Privilege Vulnerability | Important |
| Windows Kernel | CVE-2024-38153 | Windows Kernel Elevation of Privilege Vulnerability | Important |
| Windows Kernel | CVE-2024-38106 | Windows Kernel Elevation of Privilege Vulnerability | Important |
| Windows Kernel-Mode Drivers | CVE-2024-38187 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important |
| Windows Kernel-Mode Drivers | CVE-2024-38191 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability | Important |
| Windows Kernel-Mode Drivers | CVE-2024-38184 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important |
| Windows Kernel-Mode Drivers | CVE-2024-38186 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important |
| Windows Kernel-Mode Drivers | CVE-2024-38185 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important |
| Windows Layer-2 Bridge Network Driver | CVE-2024-38146 | Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability | Important |
| Windows Layer-2 Bridge Network Driver | CVE-2024-38145 | Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability | Important |
| Windows Mark of the Web (MOTW) | CVE-2024-38213 | Windows Mark of the Web Security Feature Bypass Vulnerability | Moderate |
| Windows Mobile Broadband | CVE-2024-38161 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Important |
| Windows Network Address Translation (NAT) | CVE-2024-38132 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Important |
| Windows Network Address Translation (NAT) | CVE-2024-38126 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Important |
| Windows Network Virtualization | CVE-2024-38160 | Windows Network Virtualization Remote Code Execution Vulnerability | Critical |
| Windows Network Virtualization | CVE-2024-38159 | Windows Network Virtualization Remote Code Execution Vulnerability | Critical |
| Windows NT OS Kernel | CVE-2024-38135 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | Important |
| Windows NTFS | CVE-2024-38117 | NTFS Elevation of Privilege Vulnerability | Important |
| Windows Power Dependency Coordinator | CVE-2024-38107 | Windows Power Dependency Coordinator Elevation of Privilege Vulnerability | Important |
| Windows Print Spooler Components | CVE-2024-38198 | Windows Print Spooler Elevation of Privilege Vulnerability | Important |
| Windows Resource Manager | CVE-2024-38137 | Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability | Important |
| Windows Resource Manager | CVE-2024-38136 | Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2024-38130 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2024-38128 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2024-38154 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2024-38121 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2024-38214 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | Important |
| Windows Routing and Remote Access Service (RRAS) | CVE-2024-38120 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important |
| Windows Scripting | CVE-2024-38178 | Scripting Engine Memory Corruption Vulnerability | Important |
| Windows Secure Boot | CVE-2022-3775 | Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences | Critical |
| Windows Secure Boot | CVE-2023-40547 | Redhat: CVE-2023-40547 Shim - RCE in HTTP boot support may lead to secure boot bypass | Critical |
| Windows Secure Boot | CVE-2022-2601 | Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass | Important |
| Windows Secure Kernel Mode | CVE-2024-21302 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability | Important |
| Windows Secure Kernel Mode | CVE-2024-38142 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability | Important |
| Windows Security Center | CVE-2024-38155 | Security Center Broker Information Disclosure Vulnerability | Important |
| Windows SmartScreen | CVE-2024-38180 | Windows SmartScreen Security Feature Bypass Vulnerability | Important |
| Windows TCP/IP | CVE-2024-38063 | Windows TCP/IP Remote Code Execution Vulnerability | Critical |
| Windows Transport Security Layer (TLS) | CVE-2024-38148 | Windows Secure Channel Denial of Service Vulnerability | Important |
| Windows Update Stack | CVE-2024-38202 | Windows Update Stack Elevation of Privilege Vulnerability | Important |
| Windows Update Stack | CVE-2024-38163 | Windows Update Stack Elevation of Privilege Vulnerability | Important |
| Windows WLAN Auto Config Service | CVE-2024-38143 | Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability | Important |