Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 20 |
CVE-ID | CVE-2024-38010 CVE-2024-38065 CVE-2024-37971 CVE-2024-38011 CVE-2024-37978 CVE-2024-37977 CVE-2024-37972 CVE-2024-37984 CVE-2024-37969 CVE-2024-37988 CVE-2024-28899 CVE-2024-37987 CVE-2024-37974 CVE-2024-37970 CVE-2024-37986 CVE-2024-37989 CVE-2024-37975 CVE-2024-37973 CVE-2024-26184 CVE-2024-37981 |
CWE-ID | CWE-130 CWE-122 CWE-121 CWE-822 CWE-843 CWE-191 CWE-674 CWE-190 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
Windows Operating systems & Components / Operating system Windows Server Operating systems & Components / Operating system |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains information about 20 vulnerabilities.
EUVDB-ID: #VU94008
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38010
CWE-ID:
CWE-130 - Improper Handling of Length Parameter Inconsistency
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3 External linkshttp://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38010
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94036
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38065
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. An attacker with physical access can pass specially crafted data to the application, trigger a heap-based buffer overflow and bypass Secure Boot
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94035
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37971
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37971
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94034
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38011
CWE-ID:
CWE-130 - Improper Handling of Length Parameter Inconsistency
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38011
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94033
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37978
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 1607 10.0.14393.7159, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 1607 10.0.14393.7159, 10 1607 10.0.14393.7159
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37978
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94031
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37977
CWE-ID:
CWE-122 - Heap-based Buffer Overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can pass specially crafted data to the application, trigger a heap-based buffer overflow and bypass Secure Boot
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows Server: before 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2016 10.0.14393.7159
Windows: before 10 1607 10.0.14393.7159, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 1607 10.0.14393.7159, 10 1607 10.0.14393.7159, 10 1607 10.0.14393.7159
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37977
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94026
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37972
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37972
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94025
Risk: Low
CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37984
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A local attacker can trigger stack-based buffer overflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37984
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94023
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37969
CWE-ID:
CWE-822 - Untrusted Pointer Dereference
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to untrusted pointer dereference in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37969
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94021
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37988
CWE-ID:
CWE-130 - Improper Handling of Length Parameter Inconsistency
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37988
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94020
Risk: Medium
CVSSv3.1: 7.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-28899
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28899
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94019
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37987
CWE-ID:
CWE-843 - Type confusion
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a type confusion error in Secure Boot. A remote attacker on the local network can pass specially crafted data to the application, trigger a type confusion error and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37987
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94018
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37974
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37974
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94017
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37970
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a boundary error in Secure Boot. A remote attacker on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37970
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94016
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37986
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94015
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37989
CWE-ID:
CWE-130 - Improper Handling of Length Parameter Inconsistency
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass security features.
The vulnerability exists due to improper handling of length parameter inconsistency in Secure Boot. A remote attacker on the local network can bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37989
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94014
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37975
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37975
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94012
Risk: Low
CVSSv3.1: 7.3 [CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37973
CWE-ID:
CWE-674 - Uncontrolled Recursion
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to compromise the target system.
The vulnerability exists due to infinite recursion in Secure Boot. A local attacker can pass specially crafted input to the application and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1507 10.0.10240.20710, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2012 R2 6.3.9600.22074, 2012 6.2.9200.24975, 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2012 R2 6.3.9600.22074, 2012 R2 6.3.9600.22074
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37973
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94011
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-26184
CWE-ID:
CWE-190 - Integer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer overflow in Secure Boot. A remote user on the local network can pass specially crafted data to the application, trigger integer overflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows Server: before 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2016 10.0.14393.7159
Windows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1607 10.0.14393.7159, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26184
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU94009
Risk: Medium
CVSSv3.1: 7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-37981
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to integer underflow in Secure Boot. A remote attacker on the local network can send a specially crafted request to the affected application, trigger integer underflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: before 10 21H2 10.0.19044.4651, 10 22H2 10.0.19045.4651, 10 1607 10.0.14393.7159, 10 1809 10.0.17763.6054, 11 21H2 10.0.22000.3079, 11 22H2 10.0.22621.3880, 11 23H2 10.0.22631.3880, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651, 10 21H2 10.0.19044.4651
Windows Server: before 2016 10.0.14393.7159, 2022 10.0.20348.2582, 2016 10.0.14393.7159
CPE2.3http://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37981
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.