Bleeping Computer

Microsoft May 2024 Patch Tuesday fixes 3 zero-days, 61 flaws


Today is Microsoft’s May 2024 Patch Tuesday, which includes security updates for 61 flaws and three actively exploited or publicly disclosed zero days.

This Patch Tuesday only fixes one critical vulnerability, a Microsoft SharePoint Server Remote Code Execution Vulnerability.

The number of bugs in each vulnerability category is listed below:

  • 17 Elevation of Privilege Vulnerabilities
  • 2 Security Feature Bypass Vulnerabilities
  • 27 Remote Code Execution Vulnerabilities
  • 7 Information Disclosure Vulnerabilities
  • 3 Denial of Service Vulnerabilities
  • 4 Spoofing Vulnerabilities

The total count of 61 flaws does not include 2 Microsoft Edge flaws fixed on May 2nd and four fixed on May 10th.

To learn more about the non-security updates released today, you can review our dedicated articles on the new Windows 11 KB5037771 cumulative update and the Windows 10 KB5037768 update.

Three zero-days fixed

This month’s Patch Tuesday fixes two actively exploited and one publicly disclosed zero-day vulnerabilities.

Microsoft classifies a zero-day as a flaw publicly disclosed or actively exploited with no official fix available.

The two actively exploited zero-day vulnerabilities in today’s updates are:

CVE-2024-30040 – Windows MSHTML Platform Security Feature Bypass Vulnerability

Microsoft has fixed an actively exploited bypass to OLE mitigations, which were added to Microsoft 365 and Microsoft Office to protect users from vulnerable COM/OLE controls.

“An attacker would have to convince the user to load a malicious file onto a vulnerable system, typically by way of an enticement in an Email or Instant Messenger message, and then convince the user to manipulate the specially crafted file, but not necessarily click or open the malicious file,” explains Microsoft.

“An unauthenticated attacker who successfully exploited this vulnerability could gain code execution through convincing a user to open a malicious document at which point the attacker could execute arbitrary code in the context of the user,” continued Microsoft.

It is not known how the flaw was abused in attacks or who discovered it.

CVE-2024-30051 – Windows DWM Core Library Elevation of Privilege Vulnerability

Microsoft has fixed an actively exploited Windows DWM Core Library flaw that provides SYSTEM privileges.

“An attacker who successfully exploited this vulnerability could gain SYSTEM privileges,” explains Microsoft.

Kaspersky states that recent Qakbot malware phishing attacks used malicious documents to exploit the flaw and gain SYSTEM privileges on Windows devices.

Microsoft said the flaw was disclosed by the following researchers: Mert Degirmenci and Boris Larin with Kaspersky, Quan Jin with DBAPPSecurity WeBin Lab Guoxian Zhong with DBAPPSecurity WeBin Lab, and Vlad Stolyarov and Benoit Sevens of Google Threat Analysis Group Bryce Abdo and Adam Brunner of Google Mandiant.

Microsoft states that the CVE-2024-30051 was also publicly disclosed, but it’s unclear where that was done. In addition, Microsoft says a denial of service flaw in Microsoft Visual Studio tracked as CVE-2024-30046 was publicly disclosed as well.

Recent updates from other companies

Other vendors who released updates or advisories in May 2024 include:

Unfortunately, we will no longer be linking to SAP’s Patch Tuesday security updates as they have placed them behind a customer login.

The May 2024 Patch Tuesday Security Updates

Below is the complete list of resolved vulnerabilities in the May 2024 Patch Tuesday updates.

To access the full description of each vulnerability and the systems it affects, you can view the full report here.

TagCVE IDCVE TitleSeverity
.NET and Visual StudioCVE-2024-30045.NET and Visual Studio Remote Code Execution VulnerabilityImportant
Azure MigrateCVE-2024-30053Azure Migrate Cross-Site Scripting VulnerabilityImportant
Microsoft BingCVE-2024-30041Microsoft Bing Search Spoofing VulnerabilityImportant
Microsoft Brokering File SystemCVE-2024-30007Microsoft Brokering File System Elevation of Privilege VulnerabilityImportant
Microsoft Dynamics 365 Customer InsightsCVE-2024-30048Dynamics 365 Customer Insights Spoofing VulnerabilityImportant
Microsoft Dynamics 365 Customer InsightsCVE-2024-30047Dynamics 365 Customer Insights Spoofing VulnerabilityImportant
Microsoft Edge (Chromium-based)CVE-2024-4558Chromium: CVE-2024-4558 Use after free in ANGLEUnknown
Microsoft Edge (Chromium-based)CVE-2024-4331Chromium: CVE-2024-4331 Use after free in Picture In PictureUnknown
Microsoft Edge (Chromium-based)CVE-2024-4671Chromium: CVE-2024-4671 Use after free in VisualsUnknown
Microsoft Edge (Chromium-based)CVE-2024-30055Microsoft Edge (Chromium-based) Spoofing VulnerabilityLow
Microsoft Edge (Chromium-based)CVE-2024-4368Chromium: CVE-2024-4368 Use after free in DawnUnknown
Microsoft Edge (Chromium-based)CVE-2024-4559Chromium: CVE-2024-4559 Heap buffer overflow in WebAudioUnknown
Microsoft IntuneCVE-2024-30059Microsoft Intune for Android Mobile Application Management Tampering VulnerabilityImportant
Microsoft Office ExcelCVE-2024-30042Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointCVE-2024-30044Microsoft SharePoint Server Remote Code Execution VulnerabilityCritical
Microsoft Office SharePointCVE-2024-30043Microsoft SharePoint Server Information Disclosure VulnerabilityImportant
Microsoft WDAC OLE DB provider for SQLCVE-2024-30006Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityImportant
Microsoft Windows SCSI Class System FileCVE-2024-29994Microsoft Windows SCSI Class System File Elevation of Privilege VulnerabilityImportant
Microsoft Windows Search ComponentCVE-2024-30033Windows Search Service Elevation of Privilege VulnerabilityImportant
Power BICVE-2024-30054Microsoft Power BI Client JavaScript SDK Information Disclosure VulnerabilityImportant
Visual StudioCVE-2024-30046Visual Studio Denial of Service VulnerabilityImportant
Visual StudioCVE-2024-32004GitHub: CVE-2024-32004 Remote Code Execution while cloning special-crafted local repositoriesImportant
Visual StudioCVE-2024-32002CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code ExecutionImportant
Windows Cloud Files Mini Filter DriverCVE-2024-30034Windows Cloud Files Mini Filter Driver Information Disclosure VulnerabilityImportant
Windows CNG Key Isolation ServiceCVE-2024-30031Windows CNG Key Isolation Service Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2024-29996Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2024-30037Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Common Log File System DriverCVE-2024-30025Windows Common Log File System Driver Elevation of Privilege VulnerabilityImportant
Windows Cryptographic ServicesCVE-2024-30020Windows Cryptographic Services Remote Code Execution VulnerabilityImportant
Windows Cryptographic ServicesCVE-2024-30016Windows Cryptographic Services Information Disclosure VulnerabilityImportant
Windows Deployment ServicesCVE-2024-30036Windows Deployment Services Information Disclosure VulnerabilityImportant
Windows DHCP ServerCVE-2024-30019DHCP Server Service Denial of Service VulnerabilityImportant
Windows DWM Core LibraryCVE-2024-30008Windows DWM Core Library Information Disclosure VulnerabilityImportant
Windows DWM Core LibraryCVE-2024-30051Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2024-30035Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2024-30032Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows Hyper-VCVE-2024-30011Windows Hyper-V Denial of Service VulnerabilityImportant
Windows Hyper-VCVE-2024-30017Windows Hyper-V Remote Code Execution VulnerabilityImportant
Windows Hyper-VCVE-2024-30010Windows Hyper-V Remote Code Execution VulnerabilityImportant
Windows KernelCVE-2024-30018Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows Mark of the Web (MOTW)CVE-2024-30050Windows Mark of the Web Security Feature Bypass VulnerabilityModerate
Windows Mobile BroadbandCVE-2024-30002Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-29997Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-30003Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-30012Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-29999Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-29998Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-30000Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-30005Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-30004Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-30021Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows Mobile BroadbandCVE-2024-30001Windows Mobile Broadband Driver Remote Code Execution VulnerabilityImportant
Windows MSHTML PlatformCVE-2024-30040Windows MSHTML Platform Security Feature Bypass VulnerabilityImportant
Windows NTFSCVE-2024-30027NTFS Elevation of Privilege VulnerabilityImportant
Windows Remote Access Connection ManagerCVE-2024-30039Windows Remote Access Connection Manager Information Disclosure VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2024-30009Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2024-30024Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2024-30015Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2024-30029Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2024-30023Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2024-30014Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Routing and Remote Access Service (RRAS)CVE-2024-30022Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityImportant
Windows Task SchedulerCVE-2024-26238Microsoft PLUGScheduler Scheduled Task Elevation of Privilege VulnerabilityImportant
Windows Win32K – GRFXCVE-2024-30030Win32k Elevation of Privilege VulnerabilityImportant
Windows Win32K – ICOMPCVE-2024-30038Win32k Elevation of Privilege VulnerabilityImportant
Windows Win32K – ICOMPCVE-2024-30049Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportant
Windows Win32K – ICOMPCVE-2024-30028Win32k Elevation of Privilege VulnerabilityImportant



Source link