Skip to main content

Scheduled updates for Microsoft products fix 90 vulnerabilities, including ten zero-day vulnerabilities

Summary

Scheduled updates for Microsoft products fix 90 vulnerabilities, including ten zero-day vulnerabilities

Affected platforms

The following platforms are known to be affected:

The following platforms are also known to be affected:

Threat details

Introduction

Microsoft has released security updates to address 90 vulnerabilities in Microsoft products. The security updates include ten zero-day vulnerabilities, of which six are actively exploited vulnerabilities and four are publicly disclosed vulnerabilities.

Vulnerability details

CVE-2024-38189 is an 'improper input validation' vulnerability in Microsoft Project with a CVSSv3 score of 8.8. Successful exploitation by a remote attacker requires user interaction through opening a malicious Microsoft Office Project file and could lead to arbitrary code execution. This vulnerability is under active exploitation as a zero-day.

CVE-2024-38178 is a 'type confusion' vulnerability in Scripting Engine with a CVSSv3 score of 7.5. Successful exploitation by a remote attacker requires user interaction through clicking a malicious link in Microsoft Edge when in 'Internet Explorer' mode. This vulnerability is under active exploitation as a zero-day.

CVE-2024-38193 is a 'use-after-free' vulnerability in the Ancillary Function Driver for WinSock with a CVSSv3 score of 7.8. Successful exploitation by a local attacker could lead to privilege escalation under the context of SYSTEM. This vulnerability is under active exploitation as a zero-day.

CVE-2024-38106 is a 'sensitive data storage in improperly locked memory' vulnerability in the Windows Kernel with a CVSSv3 score of 7.0. Successful exploitation by a local attacker requires winning a race condition, and could lead to privilege escalation under the context of SYSTEM. This vulnerability is under active exploitation as a zero-day.

CVE-2024-38107 is a 'use-after-free' vulnerability in the Windows Power Dependency Coordinator with a CVSSv3 score of 7.8. Successful exploitation by a local attacker could lead to privilege escalation under the context of SYSTEM. This vulnerability is under active exploitation as a zero-day.

CVE-2024-38213 is a 'protection mechanism failure' vulnerability in the Mark of the Web security feature with a CVSSv3 score of 6.5. Successful exploitation by an attacker could allow malicious files to bypass the Windows SmartScreen user experience. This vulnerability is under active exploitation as a zero-day.

CVE-2024-38063 is an 'integer underflow' vulnerability in Microsoft Windows with a CVSSv3 score of 9.8. Successful exploitation by a remote, unauthenticated attacker requires crafting a malicious IPv6 packet, and could lead to arbitrary code execution.

CVE-2024-38200 is an 'exposure of sensitive information to an unauthorised actor' vulnerability in Microsoft Office with a CVSSv3 score of 6.5. Successful exploitation by a remote attacker requires user interaction and could lead to the theft of NT LAN Manager (NTLM) hashes.

Additionally, there are five remote code execution vulnerabilities in Microsoft Office products. Successful exploitation by a remote attacker requires user interaction through opening a malicious file and could lead to arbitrary code execution. These vulnerabilities are:

Remediation advice

Affected organisations are encouraged to review Microsoft's August 2024 Security Update Summary and apply the relevant updates.

Definitive source of threat updates

CVE Vulnerabilities

Last edited: 14 August 2024 1:31 pm