Advisory

Microsoft releases September 2024 patch, fixes 79 flaws including multiple zero-days, 7 critical

Take action: Another big update from Microsoft - Prioritize patching on your Windows OS, then Office and Sharepoint and finally Azure Stack Hub/Web apps. These components have actively exploited and/or critical flaws. Then go down the rest of the list and implement regular updates.


Learn More

Microsoft's September 2024 Patch Tuesday addressed a total of 79 security vulnerabilities, including four actively exploited zero-days and one publicly disclosed vulnerability. Among these, seven were rated as critical, involving remote code execution (RCE) or elevation of privilege (EoP) flaws.

The patch addresses:

  • 30 Elevation of Privilege Vulnerabilities
  • 4 Security Feature Bypass Vulnerabilities
  • 23 Remote Code Execution Vulnerabilities
  • 11 Information Disclosure Vulnerabilities
  • 8 Denial of Service Vulnerabilities
  • 3 Spoofing Vulnerabilities

Actively Exploited Zero-Day Vulnerabilities

  1. CVE-2024-38014 (CVSS score 7.8) - Windows Installer Elevation of Privilege Vulnerability - This flaw allows attackers to gain SYSTEM-level privileges on Windows systems, providing complete control over the affected system. Microsoft has not disclosed how the vulnerability is exploited in attacks. Discovered by Michael Baer from SEC Consult Vulnerability Lab.

  2. CVE-2024-38217 (CVSS score 5.4) - Windows Mark of the Web (MoTW) Security Feature Bypass Vulnerability - Publicly disclosed by Joe Desimone of Elastic Security, this vulnerability allows attackers to bypass security warnings for files downloaded from untrusted sources. Known as "LNK stomping," this technique involves creating specially crafted LNK files that evade Smart App Control and MoTW defenses, leading to a limited loss of security feature integrity.

  3. CVE-2024-38226 (CVSS score 7.3) - Microsoft Publisher Security Feature Bypass Vulnerability - Allows an attacker to bypass Office macro policies that block untrusted or malicious files, thereby potentially enabling the execution of harmful macros. Details on the disclosure and method of exploitation were not provided by Microsoft.

  4. CVE-2024-43491 (CVSS score 9.8) - Microsoft Windows Update Remote Code Execution Vulnerability - A critical RCE vulnerability in the Servicing Stack allows an attacker to exploit previously mitigated vulnerabilities on Windows 10 version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB). To mitigate this, Microsoft recommends installing the September 2024 Servicing Stack update (SSU KB5043936) followed by the September 2024 Windows security update (KB5043083).

  5. CVE-2024-43461 (CVSS score 8.8) - Windows MSHTML Platform Spoofing Vulnerability -  is also claimed to be exploited, although it's still listed on Microsoft’s website as not exploited. Exploitation was confirmed by threat actor Void Banshee.

Microsoft reports following critical vulnerabilities addressed

  1. CVE-2024-43491 - Microsoft Windows Update Remote Code Execution Vulnerability - Allows remote code execution by exploiting weaknesses in the Windows Update process, specifically affecting Windows 10 version 1507.

  2. CVE-2024-38220 - Azure Stack Hub Remote Code Execution Vulnerability - A remote code execution flaw in Azure Stack Hub that could allow attackers to gain unauthorized access to other Azure tenants' resources.

  3. CVE-2024-38018 - Microsoft SharePoint Server Remote Code Execution Vulnerability - An RCE vulnerability in Microsoft SharePoint Server, requiring at least Site Member level permissions for exploitation.

  4. CVE-2024-38194 - Azure Web Apps Elevation of Privilege Vulnerability - An elevation of privilege vulnerability in Azure Web Apps, allowing attackers to gain elevated permissions within a network.

  5. CVE-2024-38216 - Azure Stack Hub Elevation of Privilege Vulnerability - A privilege escalation flaw in Azure Stack Hub that could enable unauthorized access to system resources.

  6. CVE-2024-38119 - Windows Network Address Translation (NAT) Remote Code Execution Vulnerability - A remote code execution flaw in Windows NAT, which requires an attacker to be on the same network and successfully exploit a race condition.

  7. CVE-2024-43464 - Microsoft SharePoint Server Remote Code Execution Vulnerability - Exploitation involves uploading a maliciously crafted file to SharePoint Server and sending API requests to achieve remote code execution.

Enterprises should prioritize deploying patches for the four zero-days and the critical vulnerabilities. Organizations should educate users on the risks associated with interacting with untrusted files and websites to mitigate security feature bypasses like the MoTW bypass.

Full list of patched vulnerabilities

Tag CVE ID CVE Title Severity
Azure CycleCloud CVE-2024-43469 Azure CycleCloud Remote Code Execution Vulnerability Important
Azure Network Watcher CVE-2024-38188 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability Important
Azure Network Watcher CVE-2024-43470 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability Important
Azure Stack CVE-2024-38216 Azure Stack Hub Elevation of Privilege Vulnerability Critical
Azure Stack CVE-2024-38220 Azure Stack Hub Elevation of Privilege Vulnerability Critical
Azure Web Apps CVE-2024-38194 Azure Web Apps Elevation of Privilege Vulnerability Critical
Dynamics Business Central CVE-2024-38225 Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability Important
Microsoft AutoUpdate (MAU) CVE-2024-43492 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability Important
Microsoft Dynamics 365 (on-premises) CVE-2024-43476 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability Important
Microsoft Graphics Component CVE-2024-38247 Windows Graphics Component Elevation of Privilege Vulnerability Important
Microsoft Graphics Component CVE-2024-38250 Windows Graphics Component Elevation of Privilege Vulnerability Important
Microsoft Graphics Component CVE-2024-38249 Windows Graphics Component Elevation of Privilege Vulnerability Important
Microsoft Management Console CVE-2024-38259 Microsoft Management Console Remote Code Execution Vulnerability Important
Microsoft Office Excel CVE-2024-43465 Microsoft Excel Elevation of Privilege Vulnerability Important
Microsoft Office Publisher CVE-2024-38226 Microsoft Publisher Security Feature Bypass Vulnerability Important
Microsoft Office SharePoint CVE-2024-38227 Microsoft SharePoint Server Remote Code Execution Vulnerability Important
Microsoft Office SharePoint CVE-2024-43464 Microsoft SharePoint Server Remote Code Execution Vulnerability Critical
Microsoft Office SharePoint CVE-2024-38018 Microsoft SharePoint Server Remote Code Execution Vulnerability Critical
Microsoft Office SharePoint CVE-2024-38228 Microsoft SharePoint Server Remote Code Execution Vulnerability Important
Microsoft Office SharePoint CVE-2024-43466 Microsoft SharePoint Server Denial of Service Vulnerability Important
Microsoft Office Visio CVE-2024-43463 Microsoft Office Visio Remote Code Execution Vulnerability Important
Microsoft Outlook for iOS CVE-2024-43482 Microsoft Outlook for iOS Information Disclosure Vulnerability Important
Microsoft Streaming Service CVE-2024-38245 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important
Microsoft Streaming Service CVE-2024-38241 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important
Microsoft Streaming Service CVE-2024-38242 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important
Microsoft Streaming Service CVE-2024-38244 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important
Microsoft Streaming Service CVE-2024-38243 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important
Microsoft Streaming Service CVE-2024-38237 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability Important
Microsoft Streaming Service CVE-2024-38238 Kernel Streaming Service Driver Elevation of Privilege Vulnerability Important
Power Automate CVE-2024-43479 Microsoft Power Automate Desktop Remote Code Execution Vulnerability Important
Role: Windows Hyper-V CVE-2024-38235 Windows Hyper-V Denial of Service Vulnerability Important
SQL Server CVE-2024-37338 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability Important
SQL Server CVE-2024-37980 Microsoft SQL Server Elevation of Privilege Vulnerability Important
SQL Server CVE-2024-26191 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability Important
SQL Server CVE-2024-37339 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability Important
SQL Server CVE-2024-37337 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability Important
SQL Server CVE-2024-26186 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability Important
SQL Server CVE-2024-37342 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability Important
SQL Server CVE-2024-43474 Microsoft SQL Server Information Disclosure Vulnerability Important
SQL Server CVE-2024-37335 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability Important
SQL Server CVE-2024-37966 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability Important
SQL Server CVE-2024-37340 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability Important
SQL Server CVE-2024-37965 Microsoft SQL Server Elevation of Privilege Vulnerability Important
SQL Server CVE-2024-37341 Microsoft SQL Server Elevation of Privilege Vulnerability Important
Windows Admin Center CVE-2024-43475 Microsoft Windows Admin Center Information Disclosure Vulnerability Important
Windows AllJoyn API CVE-2024-38257 Microsoft AllJoyn API Information Disclosure Vulnerability Important
Windows Authentication Methods CVE-2024-38254 Windows Authentication Information Disclosure Vulnerability Important
Windows DHCP Server CVE-2024-38236 DHCP Server Service Denial of Service Vulnerability Important
Windows Installer CVE-2024-38014 Windows Installer Elevation of Privilege Vulnerability Important
Windows Kerberos CVE-2024-38239 Windows Kerberos Elevation of Privilege Vulnerability Important
Windows Kernel-Mode Drivers CVE-2024-38256 Windows Kernel-Mode Driver Information Disclosure Vulnerability Important
Windows Libarchive CVE-2024-43495 Windows libarchive Remote Code Execution Vulnerability Important
Windows Mark of the Web (MOTW) CVE-2024-38217 Windows Mark of the Web Security Feature Bypass Vulnerability Important
Windows Mark of the Web (MOTW) CVE-2024-43487 Windows Mark of the Web Security Feature Bypass Vulnerability Moderate
Windows MSHTML Platform CVE-2024-43461 Windows MSHTML Platform Spoofing Vulnerability Important
Windows Network Address Translation (NAT) CVE-2024-38119 Windows Network Address Translation (NAT) Remote Code Execution Vulnerability Critical
Windows Network Virtualization CVE-2024-38232 Windows Networking Denial of Service Vulnerability Important
Windows Network Virtualization CVE-2024-38233 Windows Networking Denial of Service Vulnerability Important
Windows Network Virtualization CVE-2024-38234 Windows Networking Denial of Service Vulnerability Important
Windows Network Virtualization CVE-2024-43458 Windows Networking Information Disclosure Vulnerability Important
Windows PowerShell CVE-2024-38046 PowerShell Elevation of Privilege Vulnerability Important
Windows Remote Access Connection Manager CVE-2024-38240 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability Important
Windows Remote Desktop Licensing Service CVE-2024-38231 Windows Remote Desktop Licensing Service Denial of Service Vulnerability Important
Windows Remote Desktop Licensing Service CVE-2024-38258 Windows Remote Desktop Licensing Service Information Disclosure Vulnerability Important
Windows Remote Desktop Licensing Service CVE-2024-43467 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability Important
Windows Remote Desktop Licensing Service CVE-2024-43454 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability Important
Windows Remote Desktop Licensing Service CVE-2024-38263 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability Important
Windows Remote Desktop Licensing Service CVE-2024-38260 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability Important
Windows Remote Desktop Licensing Service CVE-2024-43455 Windows Remote Desktop Licensing Service Spoofing Vulnerability Important
Windows Security Zone Mapping CVE-2024-30073 Windows Security Zone Mapping Security Feature Bypass Vulnerability Important
Windows Setup and Deployment CVE-2024-43457 Windows Setup and Deployment Elevation of Privilege Vulnerability Important
Windows Standards-Based Storage Management Service CVE-2024-38230 Windows Standards-Based Storage Management Service Denial of Service Vulnerability Important
Windows Storage CVE-2024-38248 Windows Storage Elevation of Privilege Vulnerability Important
Windows TCP/IP CVE-2024-21416 Windows TCP/IP Remote Code Execution Vulnerability Important
Windows TCP/IP CVE-2024-38045 Windows TCP/IP Remote Code Execution Vulnerability Important
Windows Update CVE-2024-43491 Microsoft Windows Update Remote Code Execution Vulnerability Critical
Windows Win32K - GRFX CVE-2024-38246 Win32k Elevation of Privilege Vulnerability Important
Windows Win32K - ICOMP CVE-2024-38252 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Important
Windows Win32K - ICOMP CVE-2024-38253 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability Important
Microsoft releases September 2024 patch, fixes  79 flaws including multiple zero-days, 7 critical