Skip to main content

Patch Tuesday (2024-09)

·1024 words·5 mins
Posts patchtuesday
zd
Author
zd
cli-geek, strategist
Table of Contents
This video summarizes the security updates released by Microsoft on September 10, 2024.

Key Takeways
#

Highest scored vulnerability is 9.8, average score is 7.70. Sign up for full briefing call if you are a Microsoft Premier or unified support customer.

  • 79 newly disclosed vulnerabilities in September 2024 release (slightly higher than average).
  • 23 remote code execution vulnerabilities (most impactful type).
  • Highest CVSS scored vulnerability is 9.8.
  • 7 ciritcal patches (lower than last month).
  • Critical vulnerabilities include CVE-2024-38063 (TCP/IP stack) and CVE-2024-3819 (line printer daemon).
  • Accelerate update deployment due to elevated risk.
  • Total of 78 CVEs that require customer action. (New metric starting in Aug 2024)
  • Total of 4 CVEs found in CISA_KEV and exploited in wild.

Highlights
#

  • CVE-2024-38018: This vulnerability impacts SharePoint servers, enabling remote code execution with low complexity. It’s crucial for organizations running their own SharePoint servers to apply the necessary patches.
  • CVE-2024-38217: This exploit allows attackers to bypass the Mark of the Web security feature, potentially leading to the download and execution of malicious files. It’s recommended to patch this vulnerability to protect users from downloading harmful content.
  • CVE-2024-43491: A critical vulnerability affecting older Windows versions (1507 and 10 2015 LTSB) was reintroduced due to a rollback of security updates. This allows attackers to exploit previously patched vulnerabilities and gain control of the system.

Video is added later since it only been released on Sep 12.

Patch_Tuesday
#


$ ./patch_tuesday.py -k 2024-aug -vc

 _____     _       _      _____               _
|  _  |___| |_ ___| |_   |_   _|_ _ ___ ___ _| |___ _ _
|   __| .'|  _|  _|   |    | | | | | -_|_ -| . | .'| | |
|__|  |__,|_| |___|_|_|    |_| |___|___|___|___|__,|_  |
                                                   |___|


 [*] Finish fetching [2,383,180 bytes] from https://api.msrc.microsoft.com/cvrf/v3.0/cvrf/2024-sep


 [*] CISA Catalog of Known Exploited Vulnerabilities [ 2024.09.11/1169 ]


 Microsoft Patch Tuesday - By MSRC
===============================================
 << September 2024 Security Updates [ 2024-09-10 ] >>


 [+] Vulnerabilities           : [  79 ]
        [-] High_Severity      : [  19 ]
        [-] High_likelihood    : [  19 ]
        [-] Exploited in_wild  : [   4 ]
        [-] Action_required    : [  78 ]
        [-] Found in CISA_KEV  : [   4 ]

                                                 High_Severity/19
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ CVE            โ”ƒ CVSS_Base/Temp  โ”ƒ Title_Value                                                                  โ”ƒ
โ”กโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ฉ
โ”‚ CVE-2024-37338 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability      โ”‚
โ”‚ CVE-2024-37335 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability      โ”‚
โ”‚ CVE-2024-37340 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability      โ”‚
โ”‚ CVE-2024-37339 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability      โ”‚
โ”‚ CVE-2024-26186 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability      โ”‚
โ”‚ CVE-2024-26191 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability      โ”‚
โ”‚ CVE-2024-38018 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SharePoint Server Remote Code Execution Vulnerability              โ”‚
โ”‚ CVE-2024-38220 โ”‚   B:9.0/T:7.8   โ”‚ Azure Stack Hub Elevation of Privilege Vulnerability                         โ”‚
โ”‚ CVE-2024-37965 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Elevation of Privilege Vulnerability                    โ”‚
โ”‚ CVE-2024-37341 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Elevation of Privilege Vulnerability                    โ”‚
โ”‚ CVE-2024-38225 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability โ”‚
โ”‚ CVE-2024-38259 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft Management Console Remote Code Execution Vulnerability             โ”‚
โ”‚ CVE-2024-38260 โ”‚   B:8.8/T:7.7   โ”‚ Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability โ”‚
โ”‚ CVE-2024-43455 โ”‚   B:8.8/T:7.7   โ”‚ Windows Remote Desktop Licensing Service Spoofing Vulnerability              โ”‚
โ”‚ CVE-2024-43461 โ”‚   B:8.8/T:7.7   โ”‚ Windows MSHTML Platform Spoofing Vulnerability                               โ”‚
โ”‚ CVE-2024-43469 โ”‚   B:8.8/T:7.7   โ”‚ Azure CycleCloud Remote Code Execution Vulnerability                         โ”‚
โ”‚ CVE-2024-43479 โ”‚   B:8.5/T:7.4   โ”‚ Microsoft Power Automate Desktop Remote Code Execution Vulnerability         โ”‚
โ”‚ CVE-2024-43491 โ”‚ B:9.8/T:9.1 [K] โ”‚ Microsoft Windows Update Remote Code Execution Vulnerability                 โ”‚
โ”‚ CVE-2024-37980 โ”‚   B:8.8/T:7.7   โ”‚ Microsoft SQL Server Elevation of Privilege Vulnerability                    โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

                                                 High_Likelihood/19
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ CVE            โ”ƒ CVSS_Base/Temp โ”ƒ Title_Value                                                                    โ”ƒ
โ”กโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ฉ
โ”‚ CVE-2024-38018 โ”‚  B:8.8/T:7.7   โ”‚ Microsoft SharePoint Server Remote Code Execution Vulnerability                โ”‚
โ”‚ CVE-2024-38241 โ”‚  B:7.8/T:6.8   โ”‚ Kernel Streaming Service Driver Elevation of Privilege Vulnerability           โ”‚
โ”‚ CVE-2024-38242 โ”‚  B:7.8/T:6.8   โ”‚ Kernel Streaming Service Driver Elevation of Privilege Vulnerability           โ”‚
โ”‚ CVE-2024-38249 โ”‚  B:7.8/T:6.8   โ”‚ Windows Graphics Component Elevation of Privilege Vulnerability                โ”‚
โ”‚ CVE-2024-38252 โ”‚  B:7.8/T:6.8   โ”‚ Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability            โ”‚
โ”‚ CVE-2024-38253 โ”‚  B:7.8/T:6.8   โ”‚ Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability            โ”‚
โ”‚ CVE-2024-43464 โ”‚  B:7.2/T:6.3   โ”‚ Microsoft SharePoint Server Remote Code Execution Vulnerability                โ”‚
โ”‚ CVE-2024-38227 โ”‚  B:7.2/T:6.3   โ”‚ Microsoft SharePoint Server Remote Code Execution Vulnerability                โ”‚
โ”‚ CVE-2024-38228 โ”‚  B:7.2/T:6.3   โ”‚ Microsoft SharePoint Server Remote Code Execution Vulnerability                โ”‚
โ”‚ CVE-2024-38237 โ”‚  B:7.8/T:6.8   โ”‚ Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability โ”‚
โ”‚ CVE-2024-38238 โ”‚  B:7.8/T:6.8   โ”‚ Kernel Streaming Service Driver Elevation of Privilege Vulnerability           โ”‚
โ”‚ CVE-2024-38243 โ”‚  B:7.8/T:6.8   โ”‚ Kernel Streaming Service Driver Elevation of Privilege Vulnerability           โ”‚
โ”‚ CVE-2024-38244 โ”‚  B:7.8/T:6.8   โ”‚ Kernel Streaming Service Driver Elevation of Privilege Vulnerability           โ”‚
โ”‚ CVE-2024-38245 โ”‚  B:7.8/T:6.8   โ”‚ Kernel Streaming Service Driver Elevation of Privilege Vulnerability           โ”‚
โ”‚ CVE-2024-38246 โ”‚  B:7.0/T:6.1   โ”‚ Win32k Elevation of Privilege Vulnerability                                    โ”‚
โ”‚ CVE-2024-38247 โ”‚  B:7.8/T:6.8   โ”‚ Windows Graphics Component Elevation of Privilege Vulnerability                โ”‚
โ”‚ CVE-2024-43457 โ”‚  B:7.8/T:6.8   โ”‚ Windows Setup and Deployment Elevation of Privilege Vulnerability              โ”‚
โ”‚ CVE-2024-43461 โ”‚  B:8.8/T:7.7   โ”‚ Windows MSHTML Platform Spoofing Vulnerability                                 โ”‚
โ”‚ CVE-2024-43487 โ”‚  B:6.5/T:6.0   โ”‚ Windows Mark of the Web Security Feature Bypass Vulnerability                  โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

                                        Exploited_in_Wild/4
โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ณโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”“
โ”ƒ CVE            โ”ƒ CVSS_Base/Temp  โ”ƒ Title_Value                                                   โ”ƒ
โ”กโ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ•‡โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”โ”ฉ
โ”‚ CVE-2024-38014 โ”‚ B:7.8/T:7.2 [K] โ”‚ Windows Installer Elevation of Privilege Vulnerability        โ”‚
โ”‚ CVE-2024-38217 โ”‚ B:5.4/T:5.0 [K] โ”‚ Windows Mark of the Web Security Feature Bypass Vulnerability โ”‚
โ”‚ CVE-2024-38226 โ”‚ B:7.3/T:6.8 [K] โ”‚ Microsoft Publisher Security Feature Bypass Vulnerability     โ”‚
โ”‚ CVE-2024-43491 โ”‚ B:9.8/T:9.1 [K] โ”‚ Microsoft Windows Update Remote Code Execution Vulnerability  โ”‚
โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ดโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜


 [+] Product Families (6)
                       Windows โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡ 28
              Microsoft Office โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡ 21
                         Azure โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡โ–‡ 20
                           ESU โ–‡โ–‡โ–‡โ–‡โ–‡ 10
                    SQL Server โ–‡โ–‡โ–‡โ–‡ 8
            Microsoft Dynamics โ–‡โ–‡โ–‡ 5

 [*] "September 2024 Security Updates" (Rev 141)
        [-] Initial Release date: 2024-09-10T07:00:00
        [-] Current Release date: 2024-09-08T00:00:00


 [*] [2024-09-11] main(): Completed within [7.7629 sec].

Outro
#

Related

Patch Tuesday (2024-08)
·954 words·5 mins
Posts patchtuesday
$ ./patch_tuesday.py -k 2024-aug -vc
Patch Tuesday (2024-07)
·1495 words·8 mins
Posts patchtuesday
Security Update Release Summary July 2024.
Fetching with Retries
·386 words·2 mins
Posts async http python
A practical example to fetch multiple pages with retries (using recursive).