New Flaw in Wi-Fi Allows for Network Eavesdropping Using Downgrade Attacks
May 17, 2024Multiple Adobe Acrobat and Adobe Reader Vulnerabilities
May 18, 2024New Flaw in Wi-Fi Allows for Network Eavesdropping Using Downgrade Attacks
May 17, 2024Multiple Adobe Acrobat and Adobe Reader Vulnerabilities
May 18, 2024Severity
High
Analysis Summary
CVE-2024-30034 CVSS:5.5
Microsoft Windows could allow a local authenticated attacker to obtain sensitive information, caused by a flaw in the Cloud Files Mini Filter Driver component. By executing a specially crafted program, an attacker could exploit this vulnerability to obtain sensitive information from Kernel memory and use this information to launch further attacks against the affected system.
CVE-2024-30004 CVSS:6.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in the Mobile Broadband Driver. By physically connecting a malicious USB device to the victim's machine, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30029 CVSS:7.5
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a numeric truncation error in the Routing and Remote Access Service (RRAS) component. By persuading a victim to connect to a malicious server, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30036 CVSS:6.5
Microsoft Windows could allow a remote attacker to obtain sensitive information, caused by a flaw in the Deployment Services component. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to obtain sensitive information.
CVE-2024-30005 CVSS:6.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in the Mobile Broadband Driver. By physically connecting a malicious USB device to the victim's machine, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30008 CVSS:5.5
Microsoft Windows could allow a local authenticated attacker to obtain sensitive information, caused by an integer underflow in the DWM Core Library component. An attacker could exploit this vulnerability to view heap memory from a privileged process running on the server.
CVE-2024-29999 CVSS:6.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in the Mobile Broadband Driver. By physically connecting a malicious USB device to the victim's machine, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30002 CVSS:6.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation in the Mobile Broadband Driver. By physically connecting a malicious USB device to the victim's machine, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30030 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a NULL pointer dereference in the Win32k component. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain SYSTEM privileges.
CVE-2024-30024 CVSS:7.5
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a numeric truncation error in the Routing and Remote Access Service (RRAS) component. By persuading a victim to connect to a malicious server, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30037 CVSS:7.5
Microsoft Windows could allow a remote attacker to gain elevated privileges on the system, caused by an out-of-bounds read in the Common Log File System component. By executing a specially crafted program, an attacker could exploit this vulnerability to gain SYSTEM privileges.
CVE-2024-26238 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by an improper link resolution before file access in the PLUGScheduler Scheduled Task component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to gain SYSTEM privileges.
CVE-2024-30028 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a use-after-free in the Win32k component. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain SYSTEM privileges.
CVE-2024-30033 CVSS:7
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Search Service component. By sending a specially crafted request, an attacker could exploit this vulnerability to escalate privileges.
CVE-2024-30022 CVSS:7.5
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a numeric truncation error in the Routing and Remote Access Service (RRAS) component. By persuading a victim to connect to a malicious server, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30015 CVSS:7.5
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a numeric truncation error in the Routing and Remote Access Service (RRAS) component. By persuading a victim to connect to a malicious server, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30011 CVSS:6.5
Microsoft Windows Hyper-V is vulnerable to a denial of service, caused by an integer underflow error. By sending a specially crafted request, a remote authenticated attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-30021 CVSS:6.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in the Mobile Broadband Driver. By physically connecting a malicious USB device to the victim's machine, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-29998 CVSS:6.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by improper input validation in the Mobile Broadband Driver. By physically connecting a malicious USB device to the victim's machine, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-29997 CVSS:6.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by an integer overflow in the Mobile Broadband Driver. By physically connecting a malicious USB device to the victim's machine, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-30038 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a heap-based buffer overflow in the Win32k component. By sending a specially crafted request, an attacker could exploit this vulnerability to obtain SYSTEM privileges.
CVE-2024-30018 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by an improper link resolution before file access in the Kernel component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to gain SYSTEM privileges.
Impact
- Denial of Service
- Code Execution
- Privilege Escalation
- Information Disclosure
Indicators of Compromise
CVE
- CVE-2024-30034
- CVE-2024-30004
- CVE-2024-30029
- CVE-2024-30036
- CVE-2024-30005
- CVE-2024-30008
- CVE-2024-29999
- CVE-2024-30002
- CVE-2024-30030
- CVE-2024-30024
- CVE-2024-30037
- CVE-2024-26238
- CVE-2024-30028
- CVE-2024-30033
- CVE-2024-30022
- CVE-2024-30015
- CVE-2024-30011
- CVE-2024-30021
- CVE-2024-29998
- CVE-2024-29997
- CVE-2024-30038
- CVE-2024-30018
Affected Vendors
Affected Products
- Microsoft Windows 10 for 32-bit Systems
- Microsoft Windows 10 for x64-based Systems
- Microsoft Windows Server 2022
- Microsoft Windows Server 2022 23H2
- Microsoft Windows 10 Version 1607 for 32-bit Systems 1607
- Microsoft Windows 10 Version 1607 for x64-based Systems 1607
- Microsoft Windows 10 Version 1809 for 32-bit Systems 1809
- Microsoft Windows 10 Version 1809 for ARM64-based Systems 1809
- Microsoft Windows 10 Version 1809 for x64-based Systems 1809
- Microsoft Windows 10 Version 21H2 for 32-bit Systems 21H2
- Microsoft Windows 10 Version 21H2 for ARM64-based Systems 21H2
- Microsoft Windows 10 Version 21H2 for x64-based Systems 21H2
- Microsoft Windows 10 Version 22H2 for 32-bit Systems 22H2
- Microsoft Windows 10 Version 22H2 for ARM64-based Systems 22H2
- Microsoft Windows 10 Version 22H2 for x64-based Systems 22H2
- Microsoft Windows 11 Version 22H2 for ARM64-based Systems 22H2
- Microsoft Windows 11 Version 22H2 for x64-based Systems 22H2
- Microsoft Windows 11 Version 23H2 for ARM64-based Systems 23H2
- Microsoft Windows 11 Version 23H2 for x64-based Systems 23H2
- Microsoft Windows 11 version 21H2 for ARM64-based Systems 22H2
- Microsoft Windows 11 version 21H2 for x64-based Systems 22H2
- Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 23H2
- Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 23H2
- Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 23H2
- Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 23H2
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 23H2
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 23H2
- Microsoft Windows Server 2012 23H2
- Microsoft Windows Server 2012 (Server Core installation) 23H2
- Microsoft Windows Server 2012 R2 23H2
- Microsoft Windows Server 2012 R2 (Server Core installation) 23H2
- Microsoft Windows Server 2016 23H2
- Microsoft Windows Server 2016 (Server Core installation) 23H2
- Microsoft Windows Server 2019 23H2
- Microsoft Windows Server 2019 (Server Core installation) 23H2
- Microsoft Windows Server 2022 (Server Core installation) 23H2
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.