Skip to content

Microsoft Discloses Multiple ZeroDay Vulnerabilities - 20240814001

Overview

CISA has added six known exploited Microsoft product vulnerabilities to the Catalog based on the evidence of active exploitation. Additionally, there are multiple vulnerabilities included within the Monthy Update release with a severity rating of 'Critical'.

What is vulnerable?

Known Exploited items:

Vulnerability CVE CVSS Severity
Microsoft Project Remote Code Execution Vulnerability CVE-2024-38189 8.8 High
Microsoft Windows Scripting Engine Memory Corruption Vulnerability CVE-2024-38178 7.5 High
Microsoft Windows SmartScreen Security Feature Bypass Vulnerability CVE-2024-38213 6.5 Medium
Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability CVE-2024-38193 7.8 High
Microsoft Windows Kernel Privilege Escalation Vulnerability CVE-2024-38106 7.0 High
Microsoft Windows Power Dependency Coordinator Privilege Escalation Vulnerability CVE-2024-38107 7.8 High

Additional Critical items included in the Monthly Update release:

Vulnerability CVE CVSS Severity
Windows TCP/IP CVE-2024-38063 9.8 Critical
Azure Stack CVE-2024-38108 9.3 Critical
Azure Health Bot CVE-2024-38109 9.1 Critical
Reliable Multicast Transport Driver (RMCAST) CVE-2024-38140 9.8 Critical
Windows Network Virtualization CVE-2024-38159 9.1 Critical
Windows Network Virtualization CVE-2024-38160 9.1 Critical
Line Printer Daemon Service (LPD) CVE-2024-38199 9.8 Critical

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours... (refer Patch Management):

Additional References

Change Log:

  • 2024-08-14: Article published.
  • 2024-08-15: Included additional CVEs rated 'Critical'.