Rewterz
Rewterz Threat Advisory – Multiple Apache Products Vulnerabilities
March 14, 2024
Rewterz
Rewterz Threat Alert – New DarkGate Malware Campaign Exploits Windows SmartScreen Vulnerability to Bypass Security – Active IOCs
March 14, 2024

Rewterz Threat Advisory – Multiple Microsoft Products Vulnerabilities

Severity

High

Analysis Summary

CVE-2024-26199 CVSS:7.8

Microsoft Office could allow a local authenticated attacker to gain elevated privileges on the system. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to obtain SYSTEM privileges.

CVE-2024-21426 CVSS:7.8

Microsoft SharePoint Server could allow a remote attacker to execute arbitrary code on the system. By persuading a victim to open a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-21436 CVSS:7.4

Microsoft Windows could allow a local attacker to gain elevated privileges on the system, caused by a flaw in the Installer component. By executing a specially crafted program, an attacker could exploit this vulnerability to delete files on the system.

CVE-2024-21392 CVSS:7.5

Microsoft ASP.NET Core and Visual Studio are vulnerable to a denial of service. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.

CVE-2024-26159 CVSS:8.8

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the ODBC Driver component. By persuading a victim to connect to a malicious SQL database, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-21438 CVSS:7.5

Microsoft Windows is vulnerable to a denial of service, caused by a flaw in the AllJoyn API component. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.

CVE-2024-21427 CVSS:7.5

Microsoft Windows could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the Kerberos component. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass the authentication feature.

CVE-2024-21418 CVSS:7.8

Microsoft Software for Open Networking in the Cloud (SONiC) could allow a local authenticated attacker to gain elevated privileges on the system. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to obtain root privileges in the Border Gateway Protocol container.

CVE-2024-21451 CVSS:8.8

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the ODBC Driver component. By persuading a victim to connect to a malicious SQL database, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-21435 CVSS:8.8

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the OLE component. By using a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-26164 CVSS:8.8

Microsoft SQL Server backend for Django could allow a remote authenticated attacker to execute arbitrary code on the system. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.

CVE-2024-21440 CVSS:8.8

Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the ODBC Driver component. By persuading a victim to connect to a malicious SQL database, an attacker could exploit this vulnerability to execute arbitrary code on the system.

Impact

  • Privilege Escalation
  • Gain Access
  • Denial of Service
  • Security Bypass

Indicators Of Compromise

CVE

  • CVE-2024-26199
  • CVE-2024-21426
  • CVE-2024-21436
  • CVE-2024-21392
  • CVE-2024-26159
  • CVE-2024-21438
  • CVE-2024-21427
  • CVE-2024-21418
  • CVE-2024-21451
  • CVE-2024-21435
  • CVE-2024-26164
  • CVE-2024-21440

Affected Vendors

Microsoft

Affected Products

  • Microsoft Windows Server 2016
  • Microsoft Windows Server 2019
  • Microsoft Windows 10 for 32-bit Systems
  • Microsoft Windows 10 for x64-based Systems
  • Microsoft Windows Server 2012
  • Microsoft Windows Server 2012 R2
  • Microsoft Windows Server 2022
  • Microsoft Visual Studio 2022 17.4
  • Microsoft Visual Studio 2022 17.6
  • Microsoft Windows Server 2019 (Server Core installation)
  • Microsoft Windows Server 2022 (Server Core installation)
  • Microsoft Visual Studio 2022 17.8
  • Microsoft Windows 10 Version 1607 for 32-bit Systems 1607
  • Microsoft Windows 10 Version 1607 for x64-based Systems 1607
  • Microsoft Windows 10 Version 1809 for 32-bit Systems 1809
  • Microsoft Windows 10 Version 1809 for ARM64-based Systems 1809
  • Microsoft Windows 10 Version 1809 for x64-based Systems 1809
  • Microsoft Windows 10 Version 21H2 for 32-bit Systems 21H2
  • Microsoft Windows 10 Version 21H2 for ARM64-based Systems 21H2
  • Microsoft Windows 10 Version 21H2 for x64-based Systems 21H2
  • Microsoft Windows 10 Version 22H2 for 32-bit Systems 22H2
  • Microsoft Windows 10 Version 22H2 for ARM64-based Systems 22H2
  • Microsoft Windows 10 Version 22H2 for x64-based Systems 22H2
  • Microsoft Windows 11 version 21H2 for ARM64-based Systems
  • Microsoft Windows 11 version 21H2 for x64-based Systems
  • Microsoft Windows 11 Version 22H2 for ARM64-based Systems 22H2
  • Microsoft Windows 11 Version 22H2 for x64-based Systems 22H2
  • Microsoft Windows 11 Version 23H2 for ARM64-based Systems 23H2
  • Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
  • Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
  • Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
  • Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
  • Microsoft Windows Server 2012 (Server Core installation)
  • Microsoft Windows Server 2012 R2 (Server Core installation)
  • Microsoft Windows Server 2016 (Server Core installation)
  • Microsoft SQL Server backend for Django
  • Microsoft Visual Studio 2022 17.9
  • Microsoft Software for Open Networking in the Cloud (SONiC)
  • Microsoft Microsoft SharePoint Server Subscription Edition
  • Microsoft Microsoft SharePoint Server 2019
  • Microsoft Microsoft SharePoint Enterprise Server 2016
  • Microsoft Microsoft 365 Apps for Enterprise for 64-bit Systems

Remediation

Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches. 

CVE-2024-26199

CVE-2024-21426

CVE-2024-21436

CVE-2024-21392

CVE-2024-26159

CVE-2024-21438

CVE-2024-21427

CVE-2024-21418

CVE-2024-21451

CVE-2024-21435

CVE-2024-26164

CVE-2024-21440