Rewterz
Cisco Alerts of Serious Vulnerability Impacting On-Prem Smart Software Manager
July 18, 2024
Rewterz
North Korea-Linked Konni APT Group – Active IOCs
July 19, 2024

Multiple Microsoft Windows Products Vulnerabilities

Severity

High

Analysis Summary

CVE-2024-38030 CVSS:6.5

Microsoft Windows Themes could allow a remote attacker to conduct spoofing attacks.

CVE-2024-37975 CVSS:8

Microsoft Windows could allow a remote attacker to bypass security restrictions, cause by a flaw in the Secure Boot component. An attacker could exploit this vulnerability to bypass security feature to cause impact on confidentiality, integrity and availability.

CVE-2024-38050 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Workstation Service component. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.

CVE-2024-38058 CVSS:6.8

Microsoft Windows could allow a physical attacker to bypass security restrictions, cause by a flaw in the BitLocker component. An attacker could exploit this vulnerability to bypass security feature to cause impact on confidentiality, integrity and availability.

CVE-2024-38049 CVSS:6.6

Microsoft Windows could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a flaw in the Distributed Transaction Coordinator component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-38011 CVSS:8

Microsoft Windows could allow a remote attacker to bypass security restrictions, cause by a flaw in the Secure Boot component. An attacker could exploit this vulnerability to bypass security feature to cause impact on confidentiality, integrity and availability.

CVE-2024-30098 CVSS:7.5

Microsoft Windows could allow a remote attacker to bypass security restrictions, cause by a flaw in the Cryptographic Services component. An attacker could exploit this vulnerability to bypass security feature to cause impact on confidentiality and integrity.

CVE-2024-30081 CVSS:7.1

Microsoft Windows could allow a remote attacker to conduct spoofing attacks.

CVE-2024-38067 CVSS:7.5

Microsoft Windows is vulnerable to a denial of service, caused by a flaw in the Online Certificate Status Protocol (OCSP) Server component. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2024-38066 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Win32k component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.

CVE-2024-38025 CVSS:7.2

Microsoft Windows could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a flaw in the Performance Monitor component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-38028 CVSS:7.2

Microsoft Windows could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a flaw in the Performance Data Helper Library. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-38051 CVSS:7.8

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the Graphics component. By persuading a victim to open a specially crafted content, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-38047 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the PowerShell component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.

CVE-2024-38054 CVSS:7.8

Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Kernel Streaming WOW Thunk Service Driver component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.

CVE-2024-38019 CVSS:7.2

Microsoft Windows could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a flaw in the Performance Data Helper Library component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-37969 CVSS:8

Microsoft Windows could allow a remote attacker to bypass security restrictions, cause by a flaw in Secure Boot component. An attacker could exploit this vulnerability to bypass security feature to cause impact on confidentiality, integrity and availability.

CVE-2024-38072 CVSS:7.5

Microsoft Windows is vulnerable to a denial of service, caused by a use-after-free flaw in the Remote Desktop Licensing Service component. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2024-37981 CVSS:8

Microsoft Windows could allow a remote attacker to bypass security restrictions, cause by a flaw in Secure Boot component. An attacker could exploit this vulnerability to bypass security feature to cause impact on confidentiality, integrity and availability.

CVE-2024-38060 CVSS:8.8

Microsoft Windows could allow a remote authenticated attacker to execute arbitrary code on the system, caused by a flaw in the Imaging component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

Impact

  • Denial of Service
  • Gain Access
  • Code Execution
  • Security Bypass
  • Privilege Escalation

Indicators of Compromise

CVE

  • CVE-2024-38030
  • CVE-2024-37975
  • CVE-2024-38050
  • CVE-2024-38058
  • CVE-2024-38049
  • CVE-2024-38011
  • CVE-2024-30098
  • CVE-2024-30081
  • CVE-2024-38067
  • CVE-2024-38066
  • CVE-2024-38025
  • CVE-2024-38028
  • CVE-2024-38051
  • CVE-2024-38047
  • CVE-2024-38054
  • CVE-2024-38019
  • CVE-2024-37969
  • CVE-2024-38072
  • CVE-2024-37981
  • CVE-2024-38060

Affected Vendors

Microsoft

Affected Products

  • Microsoft Windows 10 for 32-bit Systems
  • Microsoft Windows 10 for x64-based Systems
  • Microsoft Windows Server 2022
  • Microsoft Windows Server 2022 23H2
  • Microsoft Windows 10 Version 1607 for 32-bit Systems 1607
  • Microsoft Windows 10 Version 1607 for x64-based Systems 1607
  • Microsoft Windows 10 Version 1809 for 32-bit Systems 1809
  • Microsoft Windows 10 Version 1809 for ARM64-based Systems 1809
  • Microsoft Windows 10 Version 1809 for x64-based Systems 1809
  • Microsoft Windows 10 Version 21H2 for 32-bit Systems 21H2
  • Microsoft Windows 10 Version 21H2 for ARM64-based Systems 21H2
  • Microsoft Windows 10 Version 21H2 for x64-based Systems 21H2
  • Microsoft Windows 10 Version 22H2 for 32-bit Systems 22H2
  • Microsoft Windows 10 Version 22H2 for ARM64-based Systems 22H2
  • Microsoft Windows 10 Version 22H2 for x64-based Systems 22H2
  • Microsoft Windows 11 Version 22H2 for ARM64-based Systems 22H2
  • Microsoft Windows 11 Version 22H2 for x64-based Systems 22H2
  • Microsoft Windows 11 Version 23H2 for ARM64-based Systems 23H2
  • Microsoft Windows 11 Version 23H2 for x64-based Systems 23H2
  • Microsoft Windows 11 version 21H2 for ARM64-based Systems 22H2
  • Microsoft Windows 11 version 21H2 for x64-based Systems 22H2
  • Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 23H2
  • Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 23H2
  • Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 23H2
  • Microsoft Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 23H2
  • Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 23H2
  • Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 23H2
  • Microsoft Windows Server 2012 23H2
  • Microsoft Windows Server 2012 (Server Core installation) 23H2
  • Microsoft Windows Server 2012 R2 23H2
  • Microsoft Windows Server 2012 R2 (Server Core installation) 23H2
  • Microsoft Windows Server 2016 23H2
  • Microsoft Windows Server 2016 (Server Core installation) 23H2
  • Microsoft Windows Server 2019 23H2
  • Microsoft Windows Server 2019 (Server Core installation) 23H2
  • Microsoft Windows Server 2022 (Server Core installation) 23H2

Remediation

Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.

CVE-2024-38030

CVE-2024-37975

CVE-2024-38050

CVE-2024-38058

CVE-2024-38049

CVE-2024-38011

CVE-2024-30098

CVE-2024-30081

CVE-2024-38067

CVE-2024-38066

CVE-2024-38025

CVE-2024-38028

CVE-2024-38051

CVE-2024-38047

CVE-2024-38054

CVE-2024-38019

CVE-2024-37969

CVE-2024-38072

CVE-2024-37981

CVE-2024-38060