Multiple vulnerabilities in Microsoft Secure Boot



Risk Medium
Patch available YES
Number of vulnerabilities 20
CVE-ID CVE-2024-38010
CVE-2024-38065
CVE-2024-37971
CVE-2024-38011
CVE-2024-37978
CVE-2024-37977
CVE-2024-37972
CVE-2024-37984
CVE-2024-37969
CVE-2024-37988
CVE-2024-28899
CVE-2024-37987
CVE-2024-37974
CVE-2024-37970
CVE-2024-37986
CVE-2024-37989
CVE-2024-37975
CVE-2024-37973
CVE-2024-26184
CVE-2024-37981
CWE-ID CWE-130
CWE-122
CWE-121
CWE-822
CWE-843
CWE-191
CWE-674
CWE-190
Exploitation vector Local network
Public exploit N/A
Vulnerable software
Windows
Operating systems & Components / Operating system

Windows Server
Operating systems & Components / Operating system

Vendor Microsoft

Security Bulletin

This security bulletin contains information about 20 vulnerabilities.

1) Improper Handling of Length Parameter Inconsistency

EUVDB-ID: #VU94008

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38010

CWE-ID: CWE-130 - Improper Handling of Length Parameter Inconsistency

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security features.

The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3 External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Heap-based buffer overflow

EUVDB-ID: #VU94036

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38065

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to a boundary error in Secure Boot. An attacker with physical access can pass specially crafted data to the application, trigger a heap-based buffer overflow and bypass Secure Boot

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Stack-based buffer overflow

EUVDB-ID: #VU94035

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37971

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Improper Handling of Length Parameter Inconsistency

EUVDB-ID: #VU94034

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38011

CWE-ID: CWE-130 - Improper Handling of Length Parameter Inconsistency

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security features.

The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Stack-based buffer overflow

EUVDB-ID: #VU94033

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37978

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 1607 10.0.14393.7159, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 1607 10.0.14393.7159, 10 1607 10.0.14393.7159

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Heap-based buffer overflow

EUVDB-ID: #VU94031

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37977

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can pass specially crafted data to the application, trigger a heap-based buffer overflow and bypass Secure Boot

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows Server: before 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2016 10.0.14393.7159

Windows: before 10 1607 10.0.14393.7159, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 1607 10.0.14393.7159, 10 1607 10.0.14393.7159, 10 1607 10.0.14393.7159

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Stack-based buffer overflow

EUVDB-ID: #VU94026

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37972

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Stack-based buffer overflow

EUVDB-ID: #VU94025

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37984

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to a boundary error in Secure Boot. A local attacker can trigger stack-based buffer overflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) Untrusted Pointer Dereference

EUVDB-ID: #VU94023

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37969

CWE-ID: CWE-822 - Untrusted Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to untrusted pointer dereference in Secure Boot. A remote attacker on the local network can bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) Improper Handling of Length Parameter Inconsistency

EUVDB-ID: #VU94021

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37988

CWE-ID: CWE-130 - Improper Handling of Length Parameter Inconsistency

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security features.

The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) Stack-based buffer overflow

EUVDB-ID: #VU94020

Risk: Medium

CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-28899

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) Type Confusion

EUVDB-ID: #VU94019

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37987

CWE-ID: CWE-843 - Type confusion

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a type confusion error in Secure Boot. A remote attacker on the local network can pass specially crafted data to the application, trigger a type confusion error and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) Integer underflow

EUVDB-ID: #VU94018

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37974

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Stack-based buffer overflow

EUVDB-ID: #VU94017

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37970

CWE-ID: CWE-121 - Stack-based buffer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Integer underflow

EUVDB-ID: #VU94016

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37986

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) Improper Handling of Length Parameter Inconsistency

EUVDB-ID: #VU94015

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37989

CWE-ID: CWE-130 - Improper Handling of Length Parameter Inconsistency

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security features.

The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

17) Integer underflow

EUVDB-ID: #VU94014

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37975

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

18) Uncontrolled Recursion

EUVDB-ID: #VU94012

Risk: Low

CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37973

CWE-ID: CWE-674 - Uncontrolled Recursion

Exploit availability: No

Description

The vulnerability allows a local attacker to compromise the target system.

The vulnerability exists due to infinite recursion in Secure Boot. A local attacker can pass specially crafted input to the application and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

19) Integer overflow

EUVDB-ID: #VU94011

Risk: Low

CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-26184

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to integer overflow in Secure Boot. A remote user on the local network can pass specially crafted data to the application, trigger integer overflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows Server: before 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2016 10.0.14393.7159

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1607 10.0.14393.7159, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

20) Integer underflow

EUVDB-ID: #VU94009

Risk: Medium

CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-37981

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651

Windows Server: before 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2016 10.0.14393.7159

CPE2.3
External links

http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###