Rewterz
Multiple Microsoft Windows Products Vulnerabilities
April 17, 2024
Rewterz
Popular PuTTY SSH Client Open to be Targeted in Key Recovery Attacks
April 17, 2024

Multiple Microsoft Windows Products Vulnerabilities

Severity

High

Analysis Summary

CVE-2024-26223 CVSS:7.2

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in DNS Server. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-26183 CVSS:6.5

Microsoft Windows is vulnerable to a denial of service, caused by a NULL pointer dereference in the Kerberos component. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.

CVE-2024-26237 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a use-after-free in the Defender Credential Guard component. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain SYSTEM privileges.

CVE-2024-28919 CVSS 6.7

Microsoft Windows could allow a local authenticated attacker to bypass security restrictions, cause by protection mechanism failure in the Secure Boot component. An attacker could exploit this vulnerability to bypass secure booting.

CVE-2024-28924 CVSS:6.7

Microsoft Windows could allow a local authenticated attacker to bypass security restrictions, cause by a stack-based buffer overflow in the Secure Boot component. An attacker could exploit this vulnerability to bypass secure booting.

CVE-2024-28923 CVSS:6.4

Microsoft Windows could allow a local authenticated attacker to bypass security restrictions, cause by an integer overflow or wraparound in the Secure Boot component. An attacker could exploit this vulnerability to bypass secure booting.

CVE-2024-26180 CVSS:8

Microsoft Windows could allow a remote attacker to bypass security restrictions, cause by a stack-based buffer overflow in the Secure Boot component. An attacker could exploit this vulnerability to bypass secure booting.

CVE-2024-29052 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in Storage. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain administrative privileges.

CVE-2024-26171 CVSS:6.7

Microsoft Windows could allow a local authenticated attacker to bypass security restrictions, cause by security mechanism failure in the Secure Boot component. An attacker could exploit this vulnerability to bypass secure booting.

CVE-2024-26252 CVSS:6.8

Microsoft Windows could allow a physical attacker to execute arbitrary code on the system, caused by an untrusted pointer dereference in the rndismp6.sys component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-26231 CVSS:7.2

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in DNS Server. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-29064 CVSS:6.2

Microsoft Windows Hyper-V is vulnerable to a denial of service. By sending a specially crafted request, a local attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2024-26248 CVSS:7.5

Microsoft Windows could allow a remote authenticated attacker to gain elevated privileges on the system, caused by incorrect implementation of authentication algorithms in the Kerberos component. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain SYSTEM privileges.

CVE-2024-26214 CVSS:8.8

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in WDAC SQL Server ODBC Driver. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-26255 CVSS:5.5

Microsoft Windows could allow a local authenticated attacker to obtain sensitive information, caused by a buffer over-read in the Remote Access Connection Manager component. By executing a specially crafted program, an attacker could exploit this vulnerability to obtain sensitive information and then use this information to launch further attacks against the affected system.

CVE-2024-28922 CVSS:6.7

Microsoft Windows could allow a local authenticated attacker to bypass security restrictions, cause by protection mechanism failure in the Secure Boot component. An attacker could exploit this vulnerability to bypass secure booting.

Impact

  • Gain Access
  • Denial of Service
  • Security Bypass
  • Privilege Escalation

Indicators of Compromise

CVE

  • CVE-2024-26223
  • CVE-2024-26183
  • CVE-2024-26237
  • CVE-2024-28919
  • CVE-2024-28924
  • CVE-2024-28923
  • CVE-2024-26180
  • CVE-2024-29052
  • CVE-2024-26171
  • CVE-2024-26252
  • CVE-2024-26231
  • CVE-2024-29064
  • CVE-2024-26248
  • CVE-2024-26214
  • CVE-2024-26255
  • CVE-2024-28922

Affected Vendors

Microsoft

Affected Products

  • Microsoft Windows 10 for 32-bit Systems
  • Microsoft Windows 10 for x64-based Systems
  • Microsoft Windows Server 2022
  • Microsoft Windows Server 2022 23H2
  • Microsoft Windows 10 Version 1607 for 32-bit Systems 1607
  • Microsoft Windows 10 Version 1607 for x64-based Systems 1607
  • Microsoft Windows 10 Version 1809 for 32-bit Systems 1809
  • Microsoft Windows 10 Version 1809 for ARM64-based Systems 1809
  • Microsoft Windows 10 Version 1809 for x64-based Systems 1809
  • Microsoft Windows 10 Version 21H2 for 32-bit Systems 21H2
  • Microsoft Windows 10 Version 21H2 for ARM64-based Systems 21H2
  • Microsoft Windows 10 Version 21H2 for x64-based Systems 21H2
  • Microsoft Windows 10 Version 22H2 for 32-bit Systems 22H2
  • Microsoft Windows 10 Version 22H2 for x64-based Systems 22H2
  • Microsoft Windows 11 Version 22H2 for ARM64-based Systems 22H2
  • Microsoft Windows 11 Version 22H2 for x64-based Systems 22H2
  • Microsoft Windows 11 Version 23H2 for ARM64-based Systems 23H2
  • Microsoft Windows 11 Version 23H2 for x64-based Systems 23H2
  • Microsoft Windows 11 version 21H2 for x64-based Systems 22H2
  • Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 23H2
  • Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 23H2
  • Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 23H2
  • Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 23H2
  • Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 23H2
  • Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 23H2
  • Microsoft Windows Server 2012 23H2
  • Microsoft Windows Server 2012 (Server Core installation) 23H2
  • Microsoft Windows Server 2012 R2 23H2
  • Microsoft Windows Server 2012 R2 (Server Core installation) 23H2
  • Microsoft Windows Server 2016 23H2
  • Microsoft Windows Server 2016 (Server Core installation) 23H2
  • Microsoft Windows Server 2019 23H2
  • Microsoft Windows Server 2019 (Server Core installation) 23H2
  • Microsoft Windows Server 2022 (Server Core installation) 23H2

Remediation

Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.

CVE-2024-26223

CVE-2024-26183

CVE-2024-26237

CVE-2024-28919

CVE-2024-28924

CVE-2024-28923

CVE-2024-26180

CVE-2024-29052

CVE-2024-26171

CVE-2024-26252

CVE-2024-26231

CVE-2024-29064

CVE-2024-26248

CVE-2024-26214

CVE-2024-26255

CVE-2024-28922