Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-38250 (GCVE-0-2024-38250)
Vulnerability from cvelistv5
- CWE-126 - Buffer Over-read
| URL | Tags | ||||||
|---|---|---|---|---|---|---|---|
|
|||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-38250",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-10T18:59:14.798388Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-10T18:59:25.749Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"product": "Windows 10 Version 1809",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.6293",
"status": "affected",
"version": "10.0.17763.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2019",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.6293",
"status": "affected",
"version": "10.0.17763.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2019 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.17763.6293",
"status": "affected",
"version": "10.0.17763.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2022",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.20348.2700",
"status": "affected",
"version": "10.0.20348.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems",
"ARM64-based Systems"
],
"product": "Windows 11 version 21H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.22000.3197",
"status": "affected",
"version": "10.0.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"32-bit Systems",
"ARM64-based Systems",
"x64-based Systems"
],
"product": "Windows 10 Version 21H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19044.4894",
"status": "affected",
"version": "10.0.19043.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"ARM64-based Systems",
"x64-based Systems"
],
"product": "Windows 11 version 22H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.22621.4169",
"status": "affected",
"version": "10.0.22621.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems",
"ARM64-based Systems",
"32-bit Systems"
],
"product": "Windows 10 Version 22H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.19045.4894",
"status": "affected",
"version": "10.0.19045.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"ARM64-based Systems"
],
"product": "Windows 11 version 22H3",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.22631.4169",
"status": "affected",
"version": "10.0.22631.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows 11 Version 23H2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.22631.4169",
"status": "affected",
"version": "10.0.22631.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2022, 23H2 Edition (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.25398.1128",
"status": "affected",
"version": "10.0.25398.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"product": "Windows 10 Version 1507",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.10240.20766",
"status": "affected",
"version": "10.0.10240.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"product": "Windows 10 Version 1607",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.7336",
"status": "affected",
"version": "10.0.14393.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2016",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.7336",
"status": "affected",
"version": "10.0.14393.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2016 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.14393.7336",
"status": "affected",
"version": "10.0.14393.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"32-bit Systems"
],
"product": "Windows Server 2008 Service Pack 2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.0.6003.22870",
"status": "affected",
"version": "6.0.6003.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"32-bit Systems",
"x64-based Systems"
],
"product": "Windows Server 2008 Service Pack 2 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.0.6003.22870",
"status": "affected",
"version": "6.0.6003.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2008 Service Pack 2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.0.6003.22870",
"status": "affected",
"version": "6.0.6003.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2008 R2 Service Pack 1",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.1.7601.27320",
"status": "affected",
"version": "6.1.7601.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.1.7601.27320",
"status": "affected",
"version": "6.1.7601.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.2.9200.25073",
"status": "affected",
"version": "6.2.9200.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.2.9200.25073",
"status": "affected",
"version": "6.2.9200.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 R2",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.3.9600.22175",
"status": "affected",
"version": "6.3.9600.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"x64-based Systems"
],
"product": "Windows Server 2012 R2 (Server Core installation)",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "6.3.9600.22175",
"status": "affected",
"version": "6.3.9600.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft Office LTSC for Mac 2021",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.89.24090815",
"status": "affected",
"version": "16.0.1",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft Office for Android",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.0.16827.2xxxxx",
"status": "affected",
"version": "16.0.1",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Microsoft Office for Universal",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "16.0.14326.21xxxx",
"status": "affected",
"version": "16.0.1",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6293",
"versionStartIncluding": "10.0.17763.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6293",
"versionStartIncluding": "10.0.17763.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6293",
"versionStartIncluding": "10.0.17763.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2700",
"versionStartIncluding": "10.0.20348.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21H2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22000.3197",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19044.4894",
"versionStartIncluding": "10.0.19043.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22621.4169",
"versionStartIncluding": "10.0.22621.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.4894",
"versionStartIncluding": "10.0.19045.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22631.4169",
"versionStartIncluding": "10.0.22631.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.4169",
"versionStartIncluding": "10.0.22631.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1128",
"versionStartIncluding": "10.0.25398.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20766",
"versionStartIncluding": "10.0.10240.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7336",
"versionStartIncluding": "10.0.14393.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7336",
"versionStartIncluding": "10.0.14393.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7336",
"versionStartIncluding": "10.0.14393.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.0.6003.22870",
"versionStartIncluding": "6.0.6003.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.0.6003.22870",
"versionStartIncluding": "6.0.6003.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "6.0.6003.22870",
"versionStartIncluding": "6.0.6003.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.1.7601.27320",
"versionStartIncluding": "6.1.7601.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.1.7601.27320",
"versionStartIncluding": "6.1.7601.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.2.9200.25073",
"versionStartIncluding": "6.2.9200.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.2.9200.25073",
"versionStartIncluding": "6.2.9200.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.3.9600.22175",
"versionStartIncluding": "6.3.9600.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "6.3.9600.22175",
"versionStartIncluding": "6.3.9600.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:*:*:*:*:*:macos:*:*",
"versionEndExcluding": "16.89.24090815",
"versionStartIncluding": "16.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:office:*:*:android:*:*:*:*:*",
"versionEndExcluding": "16.0.16827.2xxxxx",
"versionStartIncluding": "16.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:office:*:*:universal:*:*:*:*:*",
"versionEndExcluding": "16.0.14326.21xxxx",
"versionStartIncluding": "16.0.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2024-09-10T07:00:00+00:00",
"descriptions": [
{
"lang": "en-US",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-126",
"description": "CWE-126: Buffer Over-read",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-31T23:02:53.771Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Windows Graphics Component Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"
}
],
"title": "Windows Graphics Component Elevation of Privilege Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2024-38250",
"datePublished": "2024-09-10T16:53:47.033Z",
"dateReserved": "2024-06-11T22:36:08.233Z",
"dateUpdated": "2024-12-31T23:02:53.771Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2024-38250\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2024-09-10T17:15:30.247\",\"lastModified\":\"2024-09-17T16:27:12.593\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Windows Graphics Component Elevation of Privilege Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de elevaci\u00f3n de privilegios en componentes gr\u00e1ficos de Windows\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-126\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:-:*:*:*:*:android:*:*\",\"matchCriteriaId\":\"DD6ED53F-7197-439D-A458-0DF13E16AE91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office:-:*:*:*:*:universal:*:*\",\"matchCriteriaId\":\"20C6F097-EFA4-4A0B-BB64-D6BA2AACC706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*\",\"matchCriteriaId\":\"BF0E8112-5B6F-4E55-8E40-38ADCF6FC654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.10240.20766\",\"matchCriteriaId\":\"85DD5735-7C22-4A98-B404-08FEF44A640F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.10240.20766\",\"matchCriteriaId\":\"83550045-529B-4968-A543-C9D298C0F31D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.14393.7336\",\"matchCriteriaId\":\"90027BBC-56AF-4F14-A118-53BBA694A0CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*\",\"versionEndIncluding\":\"10.0.14393.7336\",\"matchCriteriaId\":\"F2FBD819-1371-4941-B162-8BFCFB317EFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*\",\"versionEndExcluding\":\"10.0.17763.6293\",\"matchCriteriaId\":\"89B89FB6-5A2C-4444-9D51-B5E46A506CA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.17763.6293\",\"matchCriteriaId\":\"ADD534CE-0B4C-43DB-A27C-AC67246D0A87\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.17763.6293\",\"matchCriteriaId\":\"23DBE62F-98CC-4F76-A841-BB20C5E8075F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:arm64:*\",\"versionEndExcluding\":\"10.0.19044.4894\",\"matchCriteriaId\":\"EC7AA96F-CE3B-4E76-8BE8-A33E0E09F724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.19044.4894\",\"matchCriteriaId\":\"273D661D-7A6D-476F-9143-EBDEDD938665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.19044.4894\",\"matchCriteriaId\":\"A769F920-AB17-4C52-A416-744D91A2DE93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*\",\"versionEndExcluding\":\"10.0.19045.4894\",\"matchCriteriaId\":\"6FBDC450-FB5A-469C-8D38-9586CE5A6F48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.19045.4894\",\"matchCriteriaId\":\"6A08D353-356F-4BB0-A43F-15EBD6E2FB83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*\",\"versionEndExcluding\":\"10.0.19045.4894\",\"matchCriteriaId\":\"13DBA791-6F77-4DA1-8BF4-BA7C299C6188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*\",\"versionEndExcluding\":\"10.0.22000.3197\",\"matchCriteriaId\":\"27B86605-6710-4BC8-99A4-73462A011192\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.22000.3197\",\"matchCriteriaId\":\"24ABE040-A076-4A03-9847-B4D0C2CA5E97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*\",\"versionEndExcluding\":\"10.0.22621.4169\",\"matchCriteriaId\":\"1943A041-87C3-404D-B09C-8E25E46A6E90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.22621.4169\",\"matchCriteriaId\":\"4AC8FE5E-7E85-4520-BD68-3A9776948A5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*\",\"versionEndExcluding\":\"10.0.22621.4169\",\"matchCriteriaId\":\"76AB8812-9BA5-415B-A6B1-C5AD065D3382\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.22631.4169\",\"matchCriteriaId\":\"5EFBBCCD-A83C-4D06-BBF0-1A4E5C9F0283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*\",\"matchCriteriaId\":\"2127D10C-B6F3-4C1D-B9AA-5D78513CC996\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*\",\"matchCriteriaId\":\"AB425562-C0A0-452E-AABE-F70522F15E1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*\",\"matchCriteriaId\":\"AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.14393.7336\",\"matchCriteriaId\":\"A6291C92-7D32-4CC2-B601-FAF5B70F3BFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.17763.6293\",\"matchCriteriaId\":\"BD2C9E88-C858-4B3D-A8C5-251DD6B69FD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.20348.2700\",\"matchCriteriaId\":\"4399F533-0094-43CF-872E-FC8E4A21A904\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*\",\"versionEndExcluding\":\"10.0.25398.1128\",\"matchCriteriaId\":\"E477BBBE-C862-4127-9784-B181DD05BAE5\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38250\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-10T18:59:14.798388Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-10T18:59:21.340Z\"}}], \"cna\": {\"title\": \"Windows Graphics Component Elevation of Privilege Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.6293:*:*:*:*:*:x86:*\", \"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.6293:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 1809\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.17763.6293\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.6293:*:*:*:*:*:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2019\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.17763.6293\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.6293:*:*:*:*:*:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2019 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.17763.6293\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2700:*:*:*:*:*:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2022\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.20348.2700\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.20348.2695\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.3197:*:*:*:*:*:x64:*\", \"cpe:2.3:o:microsoft:windows_11_21H2:10.0.22000.3197:*:*:*:*:*:arm64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 11 version 21H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.22000.3197\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\", \"ARM64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.4894:*:*:*:*:*:x86:*\", \"cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.4894:*:*:*:*:*:arm64:*\", \"cpe:2.3:o:microsoft:windows_10_21H2:10.0.19044.4894:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 21H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.19044.4894\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"ARM64-based Systems\", \"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.4169:*:*:*:*:*:arm64:*\", \"cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.4169:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 11 version 22H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.22621.4169\", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\", \"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.4894:*:*:*:*:*:x64:*\", \"cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.4894:*:*:*:*:*:arm64:*\", \"cpe:2.3:o:microsoft:windows_10_22H2:10.0.19045.4894:*:*:*:*:*:x86:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 22H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.19045.4894\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\", \"ARM64-based Systems\", \"32-bit Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.4169:*:*:*:*:*:arm64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 11 version 22H3\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.22631.4169\", \"versionType\": \"custom\"}], \"platforms\": [\"ARM64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.4169:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 11 Version 23H2\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.22631.4169\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1128:*:*:*:*:*:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2022, 23H2 Edition (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.25398.1128\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20766:*:*:*:*:*:x86:*\", \"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.20766:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 1507\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.10240.20766\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7336:*:*:*:*:*:x86:*\", \"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.7336:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows 10 Version 1607\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.14393.7336\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7336:*:*:*:*:*:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2016\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.14393.7336\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7336:*:*:*:*:*:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2016 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.0\", \"lessThan\": \"10.0.14393.7336\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22870:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 Service Pack 2\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.0\", \"lessThan\": \"6.0.6003.22870\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22870:*:*:*:*:*:x64:*\", \"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22870:*:*:*:*:*:x86:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 Service Pack 2 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.0\", \"lessThan\": \"6.0.6003.22870\", \"versionType\": \"custom\"}], \"platforms\": [\"32-bit Systems\", \"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.22870:*:*:*:*:*:x86:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 Service Pack 2\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.0\", \"lessThan\": \"6.0.6003.22870\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27320:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 R2 Service Pack 1\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.1.0\", \"lessThan\": \"6.1.7601.27320\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27320:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2008 R2 Service Pack 1 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.0.0\", \"lessThan\": \"6.1.7601.27320\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25073:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.0\", \"lessThan\": \"6.2.9200.25073\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25073:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.2.0\", \"lessThan\": \"6.2.9200.25073\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22175:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 R2\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"6.3.9600.22175\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22175:*:*:*:*:*:x64:*\"], \"vendor\": \"Microsoft\", \"product\": \"Windows Server 2012 R2 (Server Core installation)\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.3.0\", \"lessThan\": \"6.3.9600.22175\", \"versionType\": \"custom\"}], \"platforms\": [\"x64-based Systems\"]}, {\"cpes\": [\"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Microsoft Office LTSC for Mac 2021\", \"versions\": [{\"status\": \"affected\", \"version\": \"16.0.1\", \"lessThan\": \"16.89.24090815\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}, {\"cpes\": [\"cpe:2.3:a:microsoft:office:*:*:android:*:*:*:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Microsoft Office for Android\", \"versions\": [{\"status\": \"affected\", \"version\": \"16.0.1\", \"lessThan\": \"16.0.16827.2xxxxx\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}, {\"cpes\": [\"cpe:2.3:a:microsoft:office:*:*:universal:*:*:*:*:*\"], \"vendor\": \"Microsoft\", \"product\": \"Microsoft Office for Universal\", \"versions\": [{\"status\": \"affected\", \"version\": \"16.0.1\", \"lessThan\": \"16.0.14326.21xxxx\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}], \"datePublic\": \"2024-09-10T07:00:00+00:00\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250\", \"name\": \"Windows Graphics Component Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Windows Graphics Component Elevation of Privilege Vulnerability\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-126\", \"description\": \"CWE-126: Buffer Over-read\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2024-10-09T01:26:12.053Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-38250\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-09T01:26:12.053Z\", \"dateReserved\": \"2024-06-11T22:36:08.233Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2024-09-10T16:53:47.033Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
NCSC-2024-0363
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Windows.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, zich verhoogde rechten toe te kennen, willekeurige code uit te voeren met rechten van het slachtoffer en mogelijk toegang te krijgen tot gevoelige gegevens.\n\nDe ernstigste kwetsbaarheid heeft kenmerk CVE-2024-43491 toegewezen gekregen en bevindt zich in het update-mechanisme van Windows. Door een fout in een vorige Services Stack Update (SSU) bleken eerder verholpen kwetsbaarheden weer te zijn teruggedraaid. Een of meer van deze kwetsbaarheden zijn vervolgens misbruikt door kwaadwillenden. Uitsluitend Windows 10 build 1507 installaties die de security updates vanaf maart 2024 (KB5035858), of andere updates t/m augustus 2024 hebben ge\u00efnstalleerd zijn kwetsbaar.\nMicrosoft heeft geen informatie vrijgegeven om welke kwetsbaarheden dit precies gaat, maar adviseert om achtereenvolgens de September 2024 Servicing stack update (SSU KB5043936) EN de September 2024 Windows security update (KB5043083) te installeren. Meer detailinformatie kan worden verkregen in de Security Guidance van deze specifieke kwetsbaarheid. Zie hiervoor de bijgevoegde referenties.\n\nVan de kwetsbaarheden met kenmerk CVE-2024-38014 en CVE-2024-38217 geeft Microsoft aan informatie te hebben dat deze beperkt en gericht zijn misbruikt.\nDe kwetsbaarheid met kenmerk CVE-2024-38014 bevindt zich in de Installer en stelt een lokale kwaadwillende in staat zich verhoogde rechten toe te kennen, mogelijk tot SYSTEM-niveau. De kwetsbaarheid met kenmerk CVE-2024-38217 bevindt zich in de Mark of the Web functionaliteit en stelt een kwaadwillende in staat om Mark of the Web te omzeilen en zo malafide code te (laten) uitvoeren door het slachtoffer. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide bestand te downloaden en uit te voeren vanaf een webserver onder controle van de kwaadwillende.\nVan de kwetsbaarheid met kenmerk CVE-2024-38217 geeft Microsoft aan bekend te zijn dat Proof-of-Concept-code wordt gedeeld binnen gesloten gemeenschappen. Van de kwetsbaarheid met kenmerk CVE-2024-38014 is (nog) geen Proof-of-Concept-code bekend.\n\n```\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38256 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Mark of the Web (MOTW): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38217 | 5.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-43487 | 6.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43461 | 8.80 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows AllJoyn API: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38257 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Standards-Based Storage Management Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38230 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Security Zone Mapping: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30073 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38240 | 8.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Update: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43491 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38014 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38249 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38250 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38247 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Libarchive: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43495 | 7.30 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Setup and Deployment: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43457 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38239 | 7.20 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Authentication Methods: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38254 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38246 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38235 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38046 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38241 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38242 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38237 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38238 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38243 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38244 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38245 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Network Address Translation (NAT): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38119 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43467 | 7.50 | Uitvoeren van willekeurige code | \n| CVE-2024-38231 | 6.50 | Denial-of-Service | \n| CVE-2024-38258 | 6.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38260 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38263 | 7.50 | Uitvoeren van willekeurige code | \n| CVE-2024-43454 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-43455 | 8.80 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38252 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38253 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21416 | 8.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38045 | 8.10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38236 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Network Virtualization: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38232 | 7.50 | Denial-of-Service | \n| CVE-2024-38233 | 7.50 | Denial-of-Service | \n| CVE-2024-38234 | 6.50 | Denial-of-Service | \n| CVE-2024-43458 | 7.70 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Storage: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38248 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Management Console: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38259 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
},
{
"category": "general",
"text": "Weak Authentication",
"title": "CWE-1390"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Resolution of Path Equivalence",
"title": "CWE-41"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Unquoted Search Path or Element",
"title": "CWE-428"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; ncscclear",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491"
}
],
"title": "Kwetsbaarheden verholpen in Microsoft Windows",
"tracking": {
"current_release_date": "2024-09-10T18:21:28.305189Z",
"id": "NCSC-2024-0363",
"initial_release_date": "2024-09-10T18:21:28.305189Z",
"revision_history": [
{
"date": "2024-09-10T18:21:28.305189Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "windows_10_version_1507",
"product": {
"name": "windows_10_version_1507",
"product_id": "CSAFPID-1453769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_1607",
"product": {
"name": "windows_10_version_1607",
"product_id": "CSAFPID-1453770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1607:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_1809",
"product": {
"name": "windows_10_version_1809",
"product_id": "CSAFPID-1453758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1809:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_21h2",
"product": {
"name": "windows_10_version_21h2",
"product_id": "CSAFPID-1453800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_21h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_22h2",
"product": {
"name": "windows_10_version_22h2",
"product_id": "CSAFPID-1453802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_22h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_21h2",
"product": {
"name": "windows_11_version_21h2",
"product_id": "CSAFPID-1453799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_21h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_22h2",
"product": {
"name": "windows_11_version_22h2",
"product_id": "CSAFPID-1453801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_22h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_22h3",
"product": {
"name": "windows_11_version_22h3",
"product_id": "CSAFPID-1453803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_22h3:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_23h2",
"product": {
"name": "windows_11_version_23h2",
"product_id": "CSAFPID-1453804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_23h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_24h2",
"product": {
"name": "windows_11_version_24h2",
"product_id": "CSAFPID-1615902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_24h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008__service_pack_2",
"product": {
"name": "windows_server_2008__service_pack_2",
"product_id": "CSAFPID-1453778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008__service_pack_2:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_r2_service_pack_1",
"product": {
"name": "windows_server_2008_r2_service_pack_1",
"product_id": "CSAFPID-1453779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1:6.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_r2_service_pack_1__server_core_installation_",
"product": {
"name": "windows_server_2008_r2_service_pack_1__server_core_installation_",
"product_id": "CSAFPID-1453780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1__server_core_installation_:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_service_pack_2",
"product": {
"name": "windows_server_2008_service_pack_2",
"product_id": "CSAFPID-1453776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_service_pack_2__server_core_installation_",
"product": {
"name": "windows_server_2008_service_pack_2__server_core_installation_",
"product_id": "CSAFPID-1453777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2__server_core_installation_:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012",
"product": {
"name": "windows_server_2012",
"product_id": "CSAFPID-1453781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012__server_core_installation_",
"product": {
"name": "windows_server_2012__server_core_installation_",
"product_id": "CSAFPID-1453782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012__server_core_installation_:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012_r2",
"product": {
"name": "windows_server_2012_r2",
"product_id": "CSAFPID-1453783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012_r2:6.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012_r2__server_core_installation_",
"product": {
"name": "windows_server_2012_r2__server_core_installation_",
"product_id": "CSAFPID-1453784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012_r2__server_core_installation_:6.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2016",
"product": {
"name": "windows_server_2016",
"product_id": "CSAFPID-1453771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2016:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2016__server_core_installation_",
"product": {
"name": "windows_server_2016__server_core_installation_",
"product_id": "CSAFPID-1453772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2016__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2019",
"product": {
"name": "windows_server_2019",
"product_id": "CSAFPID-1453759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2019:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2019__server_core_installation_",
"product": {
"name": "windows_server_2019__server_core_installation_",
"product_id": "CSAFPID-1453760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2019__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2022",
"product": {
"name": "windows_server_2022",
"product_id": "CSAFPID-1453798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2022:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2022__23h2_edition__server_core_installation_",
"product": {
"name": "windows_server_2022__23h2_edition__server_core_installation_",
"product_id": "CSAFPID-1453805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2022__23h2_edition__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38230",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38230"
},
{
"cve": "CVE-2024-38236",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38236.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38236"
},
{
"cve": "CVE-2024-38240",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38240",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38240.json"
}
],
"title": "CVE-2024-38240"
},
{
"cve": "CVE-2024-38241",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38241",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38241.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-38241"
},
{
"cve": "CVE-2024-38242",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38242.json"
}
],
"title": "CVE-2024-38242"
},
{
"cve": "CVE-2024-38249",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38249",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38249.json"
}
],
"title": "CVE-2024-38249"
},
{
"cve": "CVE-2024-38250",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38250",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38250.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38250"
},
{
"cve": "CVE-2024-38252",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38252",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38252.json"
}
],
"title": "CVE-2024-38252"
},
{
"cve": "CVE-2024-38254",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38254.json"
}
],
"title": "CVE-2024-38254"
},
{
"cve": "CVE-2024-38256",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38256"
},
{
"cve": "CVE-2024-43467",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43467.json"
}
],
"title": "CVE-2024-43467"
},
{
"cve": "CVE-2024-38014",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38014",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38014.json"
}
],
"title": "CVE-2024-38014"
},
{
"cve": "CVE-2024-38046",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38046.json"
}
],
"title": "CVE-2024-38046"
},
{
"cve": "CVE-2024-38217",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38217",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38217.json"
}
],
"title": "CVE-2024-38217"
},
{
"cve": "CVE-2024-38231",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38231",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38231.json"
}
],
"title": "CVE-2024-38231"
},
{
"cve": "CVE-2024-38234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38234",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38234.json"
}
],
"title": "CVE-2024-38234"
},
{
"cve": "CVE-2024-38235",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38235",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38235.json"
}
],
"title": "CVE-2024-38235"
},
{
"cve": "CVE-2024-38237",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-38237"
},
{
"cve": "CVE-2024-38238",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38238.json"
}
],
"title": "CVE-2024-38238"
},
{
"cve": "CVE-2024-38239",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "other",
"text": "Weak Authentication",
"title": "CWE-1390"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38239",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38239.json"
}
],
"title": "CVE-2024-38239"
},
{
"cve": "CVE-2024-38243",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38243",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-38243"
},
{
"cve": "CVE-2024-38244",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38244.json"
}
],
"title": "CVE-2024-38244"
},
{
"cve": "CVE-2024-38245",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38245",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38245.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38245"
},
{
"cve": "CVE-2024-38247",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38247",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38247.json"
}
],
"title": "CVE-2024-38247"
},
{
"cve": "CVE-2024-38257",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38257.json"
}
],
"title": "CVE-2024-38257"
},
{
"cve": "CVE-2024-38258",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38258",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38258.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38258"
},
{
"cve": "CVE-2024-38260",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38260",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38260.json"
}
],
"title": "CVE-2024-38260"
},
{
"cve": "CVE-2024-38263",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38263",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38263.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38263"
},
{
"cve": "CVE-2024-21416",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21416",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21416.json"
}
],
"title": "CVE-2024-21416"
},
{
"cve": "CVE-2024-38045",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38045",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38045.json"
}
],
"title": "CVE-2024-38045"
},
{
"cve": "CVE-2024-38119",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38119.json"
}
],
"title": "CVE-2024-38119"
},
{
"cve": "CVE-2024-43454",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43454.json"
}
],
"title": "CVE-2024-43454"
},
{
"cve": "CVE-2024-43455",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43455",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43455.json"
}
],
"title": "CVE-2024-43455"
},
{
"cve": "CVE-2024-43461",
"cwe": {
"id": "CWE-451",
"name": "User Interface (UI) Misrepresentation of Critical Information"
},
"notes": [
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43461",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43461.json"
}
],
"title": "CVE-2024-43461"
},
{
"cve": "CVE-2024-30073",
"cwe": {
"id": "CWE-41",
"name": "Improper Resolution of Path Equivalence"
},
"notes": [
{
"category": "other",
"text": "Improper Resolution of Path Equivalence",
"title": "CWE-41"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30073.json"
}
],
"title": "CVE-2024-30073"
},
{
"cve": "CVE-2024-43487",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43487"
},
{
"cve": "CVE-2024-38246",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38246",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38246.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-38246"
},
{
"cve": "CVE-2024-38248",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38248",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38248.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-38248"
},
{
"cve": "CVE-2024-38259",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38259",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38259.json"
}
],
"title": "CVE-2024-38259"
},
{
"cve": "CVE-2024-38232",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38232.json"
}
],
"title": "CVE-2024-38232"
},
{
"cve": "CVE-2024-38233",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-38233"
},
{
"cve": "CVE-2024-43458",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-43458"
},
{
"cve": "CVE-2024-38253",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38253",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38253.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-38253"
},
{
"cve": "CVE-2024-43495",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43495",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43495.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805"
]
}
],
"title": "CVE-2024-43495"
},
{
"cve": "CVE-2024-43457",
"cwe": {
"id": "CWE-428",
"name": "Unquoted Search Path or Element"
},
"notes": [
{
"category": "other",
"text": "Unquoted Search Path or Element",
"title": "CWE-428"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43457",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43457.json"
}
],
"title": "CVE-2024-43457"
},
{
"cve": "CVE-2024-43491",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-43491"
}
]
}
ncsc-2024-0365
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in diverse Office producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, zich verhoogde rechten toe te kennen, toegang te krijgen tot gevoelige gegevens of code uit te voeren met mogelijk SYSTEM-rechten.\n\nVoor succesvol misbruik van de kwetsbaarheden moet de kwaadwillende het slachtoffer misleiden een malafide bestand te openen of link te volgen naar een webserver onder controle van de kwaadwillende.\n\nVan de kwetsbaarheid met kenmerk CVE-2024-38226 geeft Microsoft aan informatie te hebben dat deze beperkt en gericht is misbruikt. De kwetsbaarheid bevindt zich in Publisher en stelt een kwaadwillende in staat om beperkingen rond de uitvoer van macro\u0027s te omzeilen en zo macro-code uit te voeren in de context van het slachtoffer. Er is (nog) geen publieke Proof-of-Concept-code of exploit bekend.\n\n```\nMicrosoft Office SharePoint: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38018 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43464 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38227 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38228 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-43466 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Publisher: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38226 | 7.30 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38250 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Visio: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43463 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft AutoUpdate (MAU): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43492 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Excel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43465 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Outlook for iOS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43482 | 6.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Office",
"tracking": {
"current_release_date": "2024-09-10T18:23:10.239728Z",
"id": "NCSC-2024-0365",
"initial_release_date": "2024-09-10T18:23:10.239728Z",
"revision_history": [
{
"date": "2024-09-10T18:23:10.239728Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "microsoft_365_apps_for_enterprise",
"product": {
"name": "microsoft_365_apps_for_enterprise",
"product_id": "CSAFPID-1453810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_365_apps_for_enterprise:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_autoupdate_for_mac",
"product": {
"name": "microsoft_autoupdate_for_mac",
"product_id": "CSAFPID-1638301",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_autoupdate_for_mac:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_excel_2016",
"product": {
"name": "microsoft_excel_2016",
"product_id": "CSAFPID-1454038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_excel_2016:16.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_2019",
"product": {
"name": "microsoft_office_2019",
"product_id": "CSAFPID-1453809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_2019:19.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_for_android",
"product": {
"name": "microsoft_office_for_android",
"product_id": "CSAFPID-1455929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_for_android:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_for_universal",
"product": {
"name": "microsoft_office_for_universal",
"product_id": "CSAFPID-1455930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_for_universal:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_ltsc_2021",
"product": {
"name": "microsoft_office_ltsc_2021",
"product_id": "CSAFPID-1453812",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_ltsc_2021:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_ltsc_for_mac_2021",
"product": {
"name": "microsoft_office_ltsc_for_mac_2021",
"product_id": "CSAFPID-1454037",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_ltsc_for_mac_2021:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_online_server",
"product": {
"name": "microsoft_office_online_server",
"product_id": "CSAFPID-1455590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_online_server:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_publisher_2016",
"product": {
"name": "microsoft_publisher_2016",
"product_id": "CSAFPID-1455765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_publisher_2016:16.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_enterprise_server_2016",
"product": {
"name": "microsoft_sharepoint_enterprise_server_2016",
"product_id": "CSAFPID-1454039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_enterprise_server_2016:16.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_server_2019",
"product": {
"name": "microsoft_sharepoint_server_2019",
"product_id": "CSAFPID-1454040",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_server_2019:16.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_server_subscription_edition",
"product": {
"name": "microsoft_sharepoint_server_subscription_edition",
"product_id": "CSAFPID-1454041",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_server_subscription_edition:16.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_visio_2016",
"product": {
"name": "microsoft_visio_2016",
"product_id": "CSAFPID-1455680",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_visio_2016:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "outlook_for_ios",
"product": {
"name": "outlook_for_ios",
"product_id": "CSAFPID-1638300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:outlook_for_ios:1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38018",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38018.json"
}
],
"title": "CVE-2024-38018"
},
{
"cve": "CVE-2024-43464",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43464",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43464.json"
}
],
"title": "CVE-2024-43464"
},
{
"cve": "CVE-2024-38227",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38227",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38227.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
}
],
"title": "CVE-2024-38227"
},
{
"cve": "CVE-2024-38228",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38228",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38228.json"
}
],
"title": "CVE-2024-38228"
},
{
"cve": "CVE-2024-43466",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43466.json"
}
],
"title": "CVE-2024-43466"
},
{
"cve": "CVE-2024-38250",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454037",
"CSAFPID-1455929",
"CSAFPID-1455930"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38250",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38250.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1454037",
"CSAFPID-1455929",
"CSAFPID-1455930"
]
}
],
"title": "CVE-2024-38250"
},
{
"cve": "CVE-2024-43465",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453809",
"CSAFPID-1455590",
"CSAFPID-1453810",
"CSAFPID-1454037",
"CSAFPID-1453812",
"CSAFPID-1454038"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43465.json"
}
],
"title": "CVE-2024-43465"
},
{
"cve": "CVE-2024-43463",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453809",
"CSAFPID-1453810",
"CSAFPID-1453812",
"CSAFPID-1455680"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43463",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43463.json"
}
],
"title": "CVE-2024-43463"
},
{
"cve": "CVE-2024-38226",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453809",
"CSAFPID-1453812",
"CSAFPID-1455765"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38226",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38226.json"
}
],
"title": "CVE-2024-38226"
},
{
"cve": "CVE-2024-43482",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1638300"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43482",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43482.json"
}
],
"title": "CVE-2024-43482"
},
{
"cve": "CVE-2024-43492",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1638301"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1638301"
]
}
],
"title": "CVE-2024-43492"
}
]
}
NCSC-2024-0365
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in diverse Office producten.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, zich verhoogde rechten toe te kennen, toegang te krijgen tot gevoelige gegevens of code uit te voeren met mogelijk SYSTEM-rechten.\n\nVoor succesvol misbruik van de kwetsbaarheden moet de kwaadwillende het slachtoffer misleiden een malafide bestand te openen of link te volgen naar een webserver onder controle van de kwaadwillende.\n\nVan de kwetsbaarheid met kenmerk CVE-2024-38226 geeft Microsoft aan informatie te hebben dat deze beperkt en gericht is misbruikt. De kwetsbaarheid bevindt zich in Publisher en stelt een kwaadwillende in staat om beperkingen rond de uitvoer van macro\u0027s te omzeilen en zo macro-code uit te voeren in de context van het slachtoffer. Er is (nog) geen publieke Proof-of-Concept-code of exploit bekend.\n\n```\nMicrosoft Office SharePoint: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38018 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43464 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38227 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38228 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-43466 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Publisher: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38226 | 7.30 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38250 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Visio: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43463 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft AutoUpdate (MAU): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43492 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Office Excel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43465 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Outlook for iOS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43482 | 6.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Office",
"tracking": {
"current_release_date": "2024-09-10T18:23:10.239728Z",
"id": "NCSC-2024-0365",
"initial_release_date": "2024-09-10T18:23:10.239728Z",
"revision_history": [
{
"date": "2024-09-10T18:23:10.239728Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "microsoft_365_apps_for_enterprise",
"product": {
"name": "microsoft_365_apps_for_enterprise",
"product_id": "CSAFPID-1453810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_365_apps_for_enterprise:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_autoupdate_for_mac",
"product": {
"name": "microsoft_autoupdate_for_mac",
"product_id": "CSAFPID-1638301",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_autoupdate_for_mac:0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_excel_2016",
"product": {
"name": "microsoft_excel_2016",
"product_id": "CSAFPID-1454038",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_excel_2016:16.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_2019",
"product": {
"name": "microsoft_office_2019",
"product_id": "CSAFPID-1453809",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_2019:19.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_for_android",
"product": {
"name": "microsoft_office_for_android",
"product_id": "CSAFPID-1455929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_for_android:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_for_universal",
"product": {
"name": "microsoft_office_for_universal",
"product_id": "CSAFPID-1455930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_for_universal:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_ltsc_2021",
"product": {
"name": "microsoft_office_ltsc_2021",
"product_id": "CSAFPID-1453812",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_ltsc_2021:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_ltsc_for_mac_2021",
"product": {
"name": "microsoft_office_ltsc_for_mac_2021",
"product_id": "CSAFPID-1454037",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_ltsc_for_mac_2021:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_office_online_server",
"product": {
"name": "microsoft_office_online_server",
"product_id": "CSAFPID-1455590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_office_online_server:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_publisher_2016",
"product": {
"name": "microsoft_publisher_2016",
"product_id": "CSAFPID-1455765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_publisher_2016:16.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_enterprise_server_2016",
"product": {
"name": "microsoft_sharepoint_enterprise_server_2016",
"product_id": "CSAFPID-1454039",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_enterprise_server_2016:16.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_server_2019",
"product": {
"name": "microsoft_sharepoint_server_2019",
"product_id": "CSAFPID-1454040",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_server_2019:16.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_sharepoint_server_subscription_edition",
"product": {
"name": "microsoft_sharepoint_server_subscription_edition",
"product_id": "CSAFPID-1454041",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_sharepoint_server_subscription_edition:16.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "microsoft_visio_2016",
"product": {
"name": "microsoft_visio_2016",
"product_id": "CSAFPID-1455680",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:microsoft_visio_2016:16.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "outlook_for_ios",
"product": {
"name": "outlook_for_ios",
"product_id": "CSAFPID-1638300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:outlook_for_ios:1.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38018",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38018",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38018.json"
}
],
"title": "CVE-2024-38018"
},
{
"cve": "CVE-2024-43464",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43464",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43464.json"
}
],
"title": "CVE-2024-43464"
},
{
"cve": "CVE-2024-38227",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38227",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38227.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
}
],
"title": "CVE-2024-38227"
},
{
"cve": "CVE-2024-38228",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38228",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38228.json"
}
],
"title": "CVE-2024-38228"
},
{
"cve": "CVE-2024-43466",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454039",
"CSAFPID-1454040",
"CSAFPID-1454041"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43466",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43466.json"
}
],
"title": "CVE-2024-43466"
},
{
"cve": "CVE-2024-38250",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454037",
"CSAFPID-1455929",
"CSAFPID-1455930"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38250",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38250.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1454037",
"CSAFPID-1455929",
"CSAFPID-1455930"
]
}
],
"title": "CVE-2024-38250"
},
{
"cve": "CVE-2024-43465",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453809",
"CSAFPID-1455590",
"CSAFPID-1453810",
"CSAFPID-1454037",
"CSAFPID-1453812",
"CSAFPID-1454038"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43465",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43465.json"
}
],
"title": "CVE-2024-43465"
},
{
"cve": "CVE-2024-43463",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453809",
"CSAFPID-1453810",
"CSAFPID-1453812",
"CSAFPID-1455680"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43463",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43463.json"
}
],
"title": "CVE-2024-43463"
},
{
"cve": "CVE-2024-38226",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453809",
"CSAFPID-1453812",
"CSAFPID-1455765"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38226",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38226.json"
}
],
"title": "CVE-2024-38226"
},
{
"cve": "CVE-2024-43482",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1638300"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43482",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43482.json"
}
],
"title": "CVE-2024-43482"
},
{
"cve": "CVE-2024-43492",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1638301"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1638301"
]
}
],
"title": "CVE-2024-43492"
}
]
}
ncsc-2024-0363
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Windows.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, zich verhoogde rechten toe te kennen, willekeurige code uit te voeren met rechten van het slachtoffer en mogelijk toegang te krijgen tot gevoelige gegevens.\n\nDe ernstigste kwetsbaarheid heeft kenmerk CVE-2024-43491 toegewezen gekregen en bevindt zich in het update-mechanisme van Windows. Door een fout in een vorige Services Stack Update (SSU) bleken eerder verholpen kwetsbaarheden weer te zijn teruggedraaid. Een of meer van deze kwetsbaarheden zijn vervolgens misbruikt door kwaadwillenden. Uitsluitend Windows 10 build 1507 installaties die de security updates vanaf maart 2024 (KB5035858), of andere updates t/m augustus 2024 hebben ge\u00efnstalleerd zijn kwetsbaar.\nMicrosoft heeft geen informatie vrijgegeven om welke kwetsbaarheden dit precies gaat, maar adviseert om achtereenvolgens de September 2024 Servicing stack update (SSU KB5043936) EN de September 2024 Windows security update (KB5043083) te installeren. Meer detailinformatie kan worden verkregen in de Security Guidance van deze specifieke kwetsbaarheid. Zie hiervoor de bijgevoegde referenties.\n\nVan de kwetsbaarheden met kenmerk CVE-2024-38014 en CVE-2024-38217 geeft Microsoft aan informatie te hebben dat deze beperkt en gericht zijn misbruikt.\nDe kwetsbaarheid met kenmerk CVE-2024-38014 bevindt zich in de Installer en stelt een lokale kwaadwillende in staat zich verhoogde rechten toe te kennen, mogelijk tot SYSTEM-niveau. De kwetsbaarheid met kenmerk CVE-2024-38217 bevindt zich in de Mark of the Web functionaliteit en stelt een kwaadwillende in staat om Mark of the Web te omzeilen en zo malafide code te (laten) uitvoeren door het slachtoffer. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide bestand te downloaden en uit te voeren vanaf een webserver onder controle van de kwaadwillende.\nVan de kwetsbaarheid met kenmerk CVE-2024-38217 geeft Microsoft aan bekend te zijn dat Proof-of-Concept-code wordt gedeeld binnen gesloten gemeenschappen. Van de kwetsbaarheid met kenmerk CVE-2024-38014 is (nog) geen Proof-of-Concept-code bekend.\n\n```\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38256 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Mark of the Web (MOTW): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38217 | 5.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-43487 | 6.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43461 | 8.80 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows AllJoyn API: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38257 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Standards-Based Storage Management Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38230 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Security Zone Mapping: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30073 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38240 | 8.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Update: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43491 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Installer: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38014 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38249 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38250 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38247 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Libarchive: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43495 | 7.30 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Setup and Deployment: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43457 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38239 | 7.20 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Authentication Methods: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38254 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38246 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38235 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38046 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38241 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38242 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38237 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38238 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38243 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38244 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38245 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Network Address Translation (NAT): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38119 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43467 | 7.50 | Uitvoeren van willekeurige code | \n| CVE-2024-38231 | 6.50 | Denial-of-Service | \n| CVE-2024-38258 | 6.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38260 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38263 | 7.50 | Uitvoeren van willekeurige code | \n| CVE-2024-43454 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-43455 | 8.80 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38252 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38253 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21416 | 8.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38045 | 8.10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38236 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Network Virtualization: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38232 | 7.50 | Denial-of-Service | \n| CVE-2024-38233 | 7.50 | Denial-of-Service | \n| CVE-2024-38234 | 6.50 | Denial-of-Service | \n| CVE-2024-43458 | 7.70 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Storage: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38248 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Management Console: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38259 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
},
{
"category": "general",
"text": "Weak Authentication",
"title": "CWE-1390"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Resolution of Path Equivalence",
"title": "CWE-41"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Unquoted Search Path or Element",
"title": "CWE-428"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; ncscclear",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491"
}
],
"title": "Kwetsbaarheden verholpen in Microsoft Windows",
"tracking": {
"current_release_date": "2024-09-10T18:21:28.305189Z",
"id": "NCSC-2024-0363",
"initial_release_date": "2024-09-10T18:21:28.305189Z",
"revision_history": [
{
"date": "2024-09-10T18:21:28.305189Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "windows_10_version_1507",
"product": {
"name": "windows_10_version_1507",
"product_id": "CSAFPID-1453769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_1607",
"product": {
"name": "windows_10_version_1607",
"product_id": "CSAFPID-1453770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1607:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_1809",
"product": {
"name": "windows_10_version_1809",
"product_id": "CSAFPID-1453758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1809:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_21h2",
"product": {
"name": "windows_10_version_21h2",
"product_id": "CSAFPID-1453800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_21h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_22h2",
"product": {
"name": "windows_10_version_22h2",
"product_id": "CSAFPID-1453802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_22h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_21h2",
"product": {
"name": "windows_11_version_21h2",
"product_id": "CSAFPID-1453799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_21h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_22h2",
"product": {
"name": "windows_11_version_22h2",
"product_id": "CSAFPID-1453801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_22h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_22h3",
"product": {
"name": "windows_11_version_22h3",
"product_id": "CSAFPID-1453803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_22h3:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_23h2",
"product": {
"name": "windows_11_version_23h2",
"product_id": "CSAFPID-1453804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_23h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_24h2",
"product": {
"name": "windows_11_version_24h2",
"product_id": "CSAFPID-1615902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_24h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008__service_pack_2",
"product": {
"name": "windows_server_2008__service_pack_2",
"product_id": "CSAFPID-1453778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008__service_pack_2:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_r2_service_pack_1",
"product": {
"name": "windows_server_2008_r2_service_pack_1",
"product_id": "CSAFPID-1453779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1:6.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_r2_service_pack_1__server_core_installation_",
"product": {
"name": "windows_server_2008_r2_service_pack_1__server_core_installation_",
"product_id": "CSAFPID-1453780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1__server_core_installation_:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_service_pack_2",
"product": {
"name": "windows_server_2008_service_pack_2",
"product_id": "CSAFPID-1453776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_service_pack_2__server_core_installation_",
"product": {
"name": "windows_server_2008_service_pack_2__server_core_installation_",
"product_id": "CSAFPID-1453777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2__server_core_installation_:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012",
"product": {
"name": "windows_server_2012",
"product_id": "CSAFPID-1453781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012__server_core_installation_",
"product": {
"name": "windows_server_2012__server_core_installation_",
"product_id": "CSAFPID-1453782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012__server_core_installation_:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012_r2",
"product": {
"name": "windows_server_2012_r2",
"product_id": "CSAFPID-1453783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012_r2:6.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012_r2__server_core_installation_",
"product": {
"name": "windows_server_2012_r2__server_core_installation_",
"product_id": "CSAFPID-1453784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012_r2__server_core_installation_:6.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2016",
"product": {
"name": "windows_server_2016",
"product_id": "CSAFPID-1453771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2016:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2016__server_core_installation_",
"product": {
"name": "windows_server_2016__server_core_installation_",
"product_id": "CSAFPID-1453772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2016__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2019",
"product": {
"name": "windows_server_2019",
"product_id": "CSAFPID-1453759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2019:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2019__server_core_installation_",
"product": {
"name": "windows_server_2019__server_core_installation_",
"product_id": "CSAFPID-1453760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2019__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2022",
"product": {
"name": "windows_server_2022",
"product_id": "CSAFPID-1453798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2022:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2022__23h2_edition__server_core_installation_",
"product": {
"name": "windows_server_2022__23h2_edition__server_core_installation_",
"product_id": "CSAFPID-1453805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2022__23h2_edition__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38230",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38230",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38230.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38230"
},
{
"cve": "CVE-2024-38236",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38236",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38236.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38236"
},
{
"cve": "CVE-2024-38240",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38240",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38240.json"
}
],
"title": "CVE-2024-38240"
},
{
"cve": "CVE-2024-38241",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38241",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38241.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-38241"
},
{
"cve": "CVE-2024-38242",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38242",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38242.json"
}
],
"title": "CVE-2024-38242"
},
{
"cve": "CVE-2024-38249",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38249",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38249.json"
}
],
"title": "CVE-2024-38249"
},
{
"cve": "CVE-2024-38250",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38250",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38250.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38250"
},
{
"cve": "CVE-2024-38252",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38252",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38252.json"
}
],
"title": "CVE-2024-38252"
},
{
"cve": "CVE-2024-38254",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38254.json"
}
],
"title": "CVE-2024-38254"
},
{
"cve": "CVE-2024-38256",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38256"
},
{
"cve": "CVE-2024-43467",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43467",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43467.json"
}
],
"title": "CVE-2024-43467"
},
{
"cve": "CVE-2024-38014",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38014",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38014.json"
}
],
"title": "CVE-2024-38014"
},
{
"cve": "CVE-2024-38046",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38046",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38046.json"
}
],
"title": "CVE-2024-38046"
},
{
"cve": "CVE-2024-38217",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38217",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38217.json"
}
],
"title": "CVE-2024-38217"
},
{
"cve": "CVE-2024-38231",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38231",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38231.json"
}
],
"title": "CVE-2024-38231"
},
{
"cve": "CVE-2024-38234",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38234",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38234.json"
}
],
"title": "CVE-2024-38234"
},
{
"cve": "CVE-2024-38235",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38235",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38235.json"
}
],
"title": "CVE-2024-38235"
},
{
"cve": "CVE-2024-38237",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38237",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38237.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-38237"
},
{
"cve": "CVE-2024-38238",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38238",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38238.json"
}
],
"title": "CVE-2024-38238"
},
{
"cve": "CVE-2024-38239",
"cwe": {
"id": "CWE-1390",
"name": "Weak Authentication"
},
"notes": [
{
"category": "other",
"text": "Weak Authentication",
"title": "CWE-1390"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38239",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38239.json"
}
],
"title": "CVE-2024-38239"
},
{
"cve": "CVE-2024-38243",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38243",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38243.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-38243"
},
{
"cve": "CVE-2024-38244",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38244",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38244.json"
}
],
"title": "CVE-2024-38244"
},
{
"cve": "CVE-2024-38245",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38245",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38245.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38245"
},
{
"cve": "CVE-2024-38247",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38247",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38247.json"
}
],
"title": "CVE-2024-38247"
},
{
"cve": "CVE-2024-38257",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38257",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38257.json"
}
],
"title": "CVE-2024-38257"
},
{
"cve": "CVE-2024-38258",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38258",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38258.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38258"
},
{
"cve": "CVE-2024-38260",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38260",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38260.json"
}
],
"title": "CVE-2024-38260"
},
{
"cve": "CVE-2024-38263",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38263",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38263.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38263"
},
{
"cve": "CVE-2024-21416",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-21416",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21416.json"
}
],
"title": "CVE-2024-21416"
},
{
"cve": "CVE-2024-38045",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38045",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38045.json"
}
],
"title": "CVE-2024-38045"
},
{
"cve": "CVE-2024-38119",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38119.json"
}
],
"title": "CVE-2024-38119"
},
{
"cve": "CVE-2024-43454",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43454",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43454.json"
}
],
"title": "CVE-2024-43454"
},
{
"cve": "CVE-2024-43455",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43455",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43455.json"
}
],
"title": "CVE-2024-43455"
},
{
"cve": "CVE-2024-43461",
"cwe": {
"id": "CWE-451",
"name": "User Interface (UI) Misrepresentation of Critical Information"
},
"notes": [
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43461",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43461.json"
}
],
"title": "CVE-2024-43461"
},
{
"cve": "CVE-2024-30073",
"cwe": {
"id": "CWE-41",
"name": "Improper Resolution of Path Equivalence"
},
"notes": [
{
"category": "other",
"text": "Improper Resolution of Path Equivalence",
"title": "CWE-41"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30073",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30073.json"
}
],
"title": "CVE-2024-30073"
},
{
"cve": "CVE-2024-43487",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:F/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43487"
},
{
"cve": "CVE-2024-38246",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38246",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38246.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-38246"
},
{
"cve": "CVE-2024-38248",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38248",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38248.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-38248"
},
{
"cve": "CVE-2024-38259",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38259",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38259.json"
}
],
"title": "CVE-2024-38259"
},
{
"cve": "CVE-2024-38232",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38232.json"
}
],
"title": "CVE-2024-38232"
},
{
"cve": "CVE-2024-38233",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38233",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38233.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-38233"
},
{
"cve": "CVE-2024-43458",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43458",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43458.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-43458"
},
{
"cve": "CVE-2024-38253",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38253",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38253.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-38253"
},
{
"cve": "CVE-2024-43495",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43495",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43495.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805"
]
}
],
"title": "CVE-2024-43495"
},
{
"cve": "CVE-2024-43457",
"cwe": {
"id": "CWE-428",
"name": "Unquoted Search Path or Element"
},
"notes": [
{
"category": "other",
"text": "Unquoted Search Path or Element",
"title": "CWE-428"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43457",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43457.json"
}
],
"title": "CVE-2024-43457"
},
{
"cve": "CVE-2024-43491",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453769"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453769"
]
}
],
"title": "CVE-2024-43491"
}
]
}
CERTFR-2024-AVI-0759
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que les vulnérabilités CVE-2024-38014, CVE-2024-38217 et CVE-2024-43491 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Windows Server 2022 versions antérieures à 10.0.20348.2695 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.4169 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows 11 version 21H2 pour systèmes x64 antérieures à 10.0.22000.3197 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22870 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.4894 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 6.3.9600.22175 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.3880 | ||
| Microsoft | N/A | Windows Server 2012 R2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.4894 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.6293 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes ARM64 versions antérieures à 10.0.17763.6293 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.22870 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.3880 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.4894 | ||
| Microsoft | N/A | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25073 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.22870 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.27320 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 6.2.9200.25073 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22621.3880 | ||
| Microsoft | N/A | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.6293 | ||
| Microsoft | N/A | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.4894 | ||
| Microsoft | N/A | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22175 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.4894 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes x64 versions antérieures à 10.0.22621.3880 | ||
| Microsoft | N/A | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.27320 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.22870 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.1742 | ||
| Microsoft | N/A | Windows Server 2016 versions antérieures à 10.0.14393.7336 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1009 | ||
| Microsoft | N/A | Windows 10 pour systèmes x64 versions antérieures à 10.0.10240.20766 | ||
| Microsoft | N/A | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19041.4894 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.7336 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4169 | ||
| Microsoft | N/A | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows 11 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.22621.4169 | ||
| Microsoft | N/A | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.4169 | ||
| Microsoft | N/A | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.7336 | ||
| Microsoft | N/A | Windows Server 2019 versions antérieures à 10.0.17763.6293 | ||
| Microsoft | N/A | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.7336 | ||
| Microsoft | N/A | Windows Server 2012 versions antérieures à 1.001 | ||
| Microsoft | N/A | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.2695 | ||
| Microsoft | N/A | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.6293 | ||
| Microsoft | N/A | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.1128 | ||
| Microsoft | N/A | Windows 10 pour systèmes 32 bits versions antérieures à 10.0.10240.20766 | ||
| Microsoft | N/A | Windows 11 version 21H2 pour systèmes ARM64 antérieures à 10.0.22000.3197 | ||
| Microsoft | N/A | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.1742 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.2695",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.4169",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes x64 ant\u00e9rieures \u00e0 10.0.22000.3197",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22870",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.4894",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22175",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.4894",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.6293",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.17763.6293",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22870",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.4894",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25073",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.22870",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.27320",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25073",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.6293",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.4894",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22175",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.4894",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22621.3880",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.27320",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.22870",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.1742",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.7336",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1009",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.10240.20766",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19041.4894",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.7336",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4169",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22621.4169",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.4169",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.7336",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.6293",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.7336",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 1.001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.2695",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.6293",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.1128",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.10240.20766",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 version 21H2 pour syst\u00e8mes ARM64 ant\u00e9rieures \u00e0 10.0.22000.3197",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.1742",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-30073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30073"
},
{
"name": "CVE-2024-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38243"
},
{
"name": "CVE-2024-43475",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43475"
},
{
"name": "CVE-2024-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38230"
},
{
"name": "CVE-2024-43487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43487"
},
{
"name": "CVE-2024-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38248"
},
{
"name": "CVE-2024-43491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43491"
},
{
"name": "CVE-2024-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38263"
},
{
"name": "CVE-2024-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38236"
},
{
"name": "CVE-2024-38238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38238"
},
{
"name": "CVE-2024-38242",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38242"
},
{
"name": "CVE-2024-43455",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43455"
},
{
"name": "CVE-2024-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38231"
},
{
"name": "CVE-2024-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38249"
},
{
"name": "CVE-2024-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38045"
},
{
"name": "CVE-2024-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38258"
},
{
"name": "CVE-2024-38252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38252"
},
{
"name": "CVE-2024-43458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43458"
},
{
"name": "CVE-2024-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38259"
},
{
"name": "CVE-2024-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38245"
},
{
"name": "CVE-2024-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38217"
},
{
"name": "CVE-2024-38254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38254"
},
{
"name": "CVE-2024-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38239"
},
{
"name": "CVE-2024-43467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43467"
},
{
"name": "CVE-2024-43495",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43495"
},
{
"name": "CVE-2024-43457",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43457"
},
{
"name": "CVE-2024-38233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38233"
},
{
"name": "CVE-2024-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38234"
},
{
"name": "CVE-2024-38241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38241"
},
{
"name": "CVE-2024-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38257"
},
{
"name": "CVE-2024-43454",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43454"
},
{
"name": "CVE-2024-21416",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21416"
},
{
"name": "CVE-2024-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38119"
},
{
"name": "CVE-2024-38235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38235"
},
{
"name": "CVE-2024-38240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38240"
},
{
"name": "CVE-2024-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38253"
},
{
"name": "CVE-2024-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38250"
},
{
"name": "CVE-2024-38046",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38046"
},
{
"name": "CVE-2024-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38246"
},
{
"name": "CVE-2024-38247",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38247"
},
{
"name": "CVE-2024-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38014"
},
{
"name": "CVE-2024-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38244"
},
{
"name": "CVE-2024-38256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38256"
},
{
"name": "CVE-2024-43461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43461"
},
{
"name": "CVE-2024-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38232"
},
{
"name": "CVE-2024-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38260"
},
{
"name": "CVE-2024-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38237"
}
],
"initial_release_date": "2024-09-11T00:00:00",
"last_revision_date": "2024-09-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0759",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que les vuln\u00e9rabilit\u00e9s CVE-2024-38014, CVE-2024-38217 et CVE-2024-43491 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38240",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38240"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-21416",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21416"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43458",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43458"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43495",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43495"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38246",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38246"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38249",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38249"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38119",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38119"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38260",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38260"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38238",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38238"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38235",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38235"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43487",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43487"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38230"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38244",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38244"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38253",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38253"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38242",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38242"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43454",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43454"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38263",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38263"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38256",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38256"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38241",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38241"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-30073",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30073"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38233",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38233"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38014",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38014"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43461",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43461"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38259",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38259"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38045",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38045"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43467",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38252",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38252"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38232",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38232"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43455",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38046",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38046"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38237",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38237"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38257",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38257"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38231",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38231"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38247",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38247"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38248",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38248"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38254",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38254"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43475",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43475"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38250",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38236",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38236"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43457",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43457"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38239",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38239"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38258",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38258"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38243",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38243"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38217",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38217"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-43491",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43491"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38245",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38245"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-38234",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38234"
}
]
}
CERTFR-2024-AVI-0758
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Microsoft Office. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et une atteinte à la confidentialité des données.
Microsoft indique que la vulnérabilité CVE-2024-38226 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | Microsoft Office Online Server versions antérieures à 16.0.10414.20000 | ||
| Microsoft | N/A | Microsoft Office LTSC pour Mac 2021 versions antérieures à 16.89.24090815 | ||
| Microsoft | N/A | Microsoft Office pour Universal versions antérieures à 16.0.14326.21xxxx | ||
| Microsoft | N/A | Outlook pour iOS versions antérieures à 4.2435.0 | ||
| Microsoft | N/A | Microsoft Excel 2016 (édition 32 bits) versions antérieures à 16.0.5465.1001 | ||
| Microsoft | N/A | Microsoft Excel 2016 (édition 64 bits) versions antérieures à 16.0.5465.1001 | ||
| Microsoft | N/A | Microsoft Office LTSC 2021 pour éditions 32 bits | ||
| Microsoft | N/A | Microsoft Office 2019 pour éditions 32 bits | ||
| Microsoft | N/A | Microsoft Publisher 2016 (édition 32 bits) versions antérieures à 16.0.5465.1001 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 32 bits | ||
| Microsoft | N/A | Microsoft Office 2019 pour éditions 64 bits | ||
| Microsoft | N/A | Microsoft Office LTSC 2021 pour éditions 64 bits | ||
| Microsoft | N/A | Microsoft Office pour Android versions antérieures à 16.0.16827.2xxxxx | ||
| Microsoft | N/A | Microsoft Publisher 2016 (édition 64 bits) versions antérieures à 16.0.5465.1001 | ||
| Microsoft | N/A | Microsoft 365 Apps pour Enterprise pour systèmes 64 bits |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Microsoft Office Online Server versions ant\u00e9rieures \u00e0 16.0.10414.20000",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC pour Mac 2021 versions ant\u00e9rieures \u00e0 16.89.24090815",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office pour Universal versions ant\u00e9rieures \u00e0 16.0.14326.21xxxx",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Outlook pour iOS versions ant\u00e9rieures \u00e0 4.2435.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Excel 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5465.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Excel 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5465.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2021 pour \u00e9ditions 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2019 pour \u00e9ditions 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Publisher 2016 (\u00e9dition 32 bits) versions ant\u00e9rieures \u00e0 16.0.5465.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 32 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office 2019 pour \u00e9ditions 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office LTSC 2021 pour \u00e9ditions 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Office pour Android versions ant\u00e9rieures \u00e0 16.0.16827.2xxxxx",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft Publisher 2016 (\u00e9dition 64 bits) versions ant\u00e9rieures \u00e0 16.0.5465.1001",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Microsoft 365 Apps pour Enterprise pour syst\u00e8mes 64 bits",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38226"
},
{
"name": "CVE-2024-43463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43463"
},
{
"name": "CVE-2024-43482",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43482"
},
{
"name": "CVE-2024-43465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43465"
},
{
"name": "CVE-2024-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38250"
}
],
"initial_release_date": "2024-09-11T00:00:00",
"last_revision_date": "2024-09-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0758",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Office. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2024-38226 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Office",
"vendor_advisories": [
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2024-43482",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43482"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2024-38226",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38226"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2024-43465",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43465"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2024-43463",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43463"
},
{
"published_at": "2024-09-10",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Office CVE-2024-38250",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"
}
]
}
fkie_cve-2024-38250
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250 | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | office | - | |
| microsoft | office | - | |
| microsoft | office_long_term_servicing_channel | 2021 | |
| microsoft | windows_10_1507 | * | |
| microsoft | windows_10_1507 | * | |
| microsoft | windows_10_1607 | * | |
| microsoft | windows_10_1607 | * | |
| microsoft | windows_10_1809 | * | |
| microsoft | windows_10_1809 | * | |
| microsoft | windows_10_1809 | * | |
| microsoft | windows_10_21h1 | * | |
| microsoft | windows_10_21h1 | * | |
| microsoft | windows_10_21h1 | * | |
| microsoft | windows_10_22h2 | * | |
| microsoft | windows_10_22h2 | * | |
| microsoft | windows_10_22h2 | * | |
| microsoft | windows_11_21h2 | * | |
| microsoft | windows_11_21h2 | * | |
| microsoft | windows_11_22h2 | * | |
| microsoft | windows_11_22h2 | * | |
| microsoft | windows_11_23h2 | * | |
| microsoft | windows_11_23h2 | * | |
| microsoft | windows_server_2008 | - | |
| microsoft | windows_server_2008 | - | |
| microsoft | windows_server_2008 | r2 | |
| microsoft | windows_server_2012 | - | |
| microsoft | windows_server_2012 | r2 | |
| microsoft | windows_server_2016 | * | |
| microsoft | windows_server_2019 | * | |
| microsoft | windows_server_2022 | * | |
| microsoft | windows_server_2022_23h2 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:office:-:*:*:*:*:android:*:*",
"matchCriteriaId": "DD6ED53F-7197-439D-A458-0DF13E16AE91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:office:-:*:*:*:*:universal:*:*",
"matchCriteriaId": "20C6F097-EFA4-4A0B-BB64-D6BA2AACC706",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
"matchCriteriaId": "BF0E8112-5B6F-4E55-8E40-38ADCF6FC654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "85DD5735-7C22-4A98-B404-08FEF44A640F",
"versionEndExcluding": "10.0.10240.20766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "83550045-529B-4968-A543-C9D298C0F31D",
"versionEndExcluding": "10.0.10240.20766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "90027BBC-56AF-4F14-A118-53BBA694A0CD",
"versionEndExcluding": "10.0.14393.7336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "F2FBD819-1371-4941-B162-8BFCFB317EFB",
"versionEndIncluding": "10.0.14393.7336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "89B89FB6-5A2C-4444-9D51-B5E46A506CA6",
"versionEndExcluding": "10.0.17763.6293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "ADD534CE-0B4C-43DB-A27C-AC67246D0A87",
"versionEndExcluding": "10.0.17763.6293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "23DBE62F-98CC-4F76-A841-BB20C5E8075F",
"versionEndExcluding": "10.0.17763.6293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "EC7AA96F-CE3B-4E76-8BE8-A33E0E09F724",
"versionEndExcluding": "10.0.19044.4894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "273D661D-7A6D-476F-9143-EBDEDD938665",
"versionEndExcluding": "10.0.19044.4894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "A769F920-AB17-4C52-A416-744D91A2DE93",
"versionEndExcluding": "10.0.19044.4894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "6FBDC450-FB5A-469C-8D38-9586CE5A6F48",
"versionEndExcluding": "10.0.19045.4894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "6A08D353-356F-4BB0-A43F-15EBD6E2FB83",
"versionEndExcluding": "10.0.19045.4894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "13DBA791-6F77-4DA1-8BF4-BA7C299C6188",
"versionEndExcluding": "10.0.19045.4894",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "27B86605-6710-4BC8-99A4-73462A011192",
"versionEndExcluding": "10.0.22000.3197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "24ABE040-A076-4A03-9847-B4D0C2CA5E97",
"versionEndExcluding": "10.0.22000.3197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "1943A041-87C3-404D-B09C-8E25E46A6E90",
"versionEndExcluding": "10.0.22621.4169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "4AC8FE5E-7E85-4520-BD68-3A9776948A5D",
"versionEndExcluding": "10.0.22621.4169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "76AB8812-9BA5-415B-A6B1-C5AD065D3382",
"versionEndExcluding": "10.0.22621.4169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "5EFBBCCD-A83C-4D06-BBF0-1A4E5C9F0283",
"versionEndExcluding": "10.0.22631.4169",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6291C92-7D32-4CC2-B601-FAF5B70F3BFD",
"versionEndExcluding": "10.0.14393.7336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BD2C9E88-C858-4B3D-A8C5-251DD6B69FD6",
"versionEndExcluding": "10.0.17763.6293",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4399F533-0094-43CF-872E-FC8E4A21A904",
"versionEndExcluding": "10.0.20348.2700",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "E477BBBE-C862-4127-9784-B181DD05BAE5",
"versionEndExcluding": "10.0.25398.1128",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en componentes gr\u00e1ficos de Windows"
}
],
"id": "CVE-2024-38250",
"lastModified": "2024-09-17T16:27:12.593",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Primary"
}
]
},
"published": "2024-09-10T17:15:30.247",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-126"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
wid-sec-w-2024-2121
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Microsoft 365 Apps ist eine Office Suite f\u00fcr zahlreiche B\u00fcroanwendungen.\r\nExcel ist ein Tabellenkalkulationsprogramm der Microsoft Office Suite und ist sowohl f\u00fcr Microsoft Windows als auch f\u00fcr Mac OS verf\u00fcgbar.\r\nDie Microsoft Office Suite beinhaltet zahlreiche B\u00fcroanwendungen wie Textverarbeitung, Tabellenkalkulation, Datenbank und weitere Applikationen.\r\nMicrosoft Office Online Server ist ein Serverprodukt, das browserbasierte Versionen von Word, PowerPoint, Excel und OneNote bereitstellt. \r\nOutlook ist ein Personal Information Manager von Microsoft und ist Bestandteil der Office Suite.\r\nDer Microsoft Publishers ist ein Programm zum Erstellen von Druckpublikationen, Websites, E-Mail-Headlines und Produktpr\u00e4sentationen.\r\nMicrosoft Sharepoint Services ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u.a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Sharepoint ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u. a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Visio ist eine Visualisierungs-Software zur Darstellung von Flu\u00dfdiagrammen, Netzpl\u00e4nen oder Organisationsdiagrammen. Microsoft Visio ist eigenst\u00e4ndiger Bestandteil des Microsoft-Office-Systems.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 ausnutzen, um seine Privilegien zu erh\u00f6hen, Sicherheitsma\u00dfnahmen zu umgehen und beliebigen Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2121 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2121.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2121 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2121"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-09-10",
"url": "https://msrc.microsoft.com/update-guide"
}
],
"source_lang": "en-US",
"title": "Microsoft Office: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-10T22:00:00.000+00:00",
"generator": {
"date": "2024-09-11T10:38:46.526+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-2121",
"initial_release_date": "2024-09-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft 365 Apps",
"product": {
"name": "Microsoft 365 Apps",
"product_id": "T037514",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:365_apps:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Excel 2016",
"product": {
"name": "Microsoft Excel 2016",
"product_id": "T037515",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:excel_2016:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "LTSC 2021",
"product": {
"name": "Microsoft Office LTSC 2021",
"product_id": "T037516",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office:ltsc_2021"
}
}
},
{
"category": "product_version",
"name": "LTSC for Mac 2021",
"product": {
"name": "Microsoft Office LTSC for Mac 2021",
"product_id": "T037517",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office:ltsc_for_mac_2021"
}
}
},
{
"category": "product_version",
"name": "for Android",
"product": {
"name": "Microsoft Office for Android",
"product_id": "T037518",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office:for_android"
}
}
},
{
"category": "product_version",
"name": "for Universal",
"product": {
"name": "Microsoft Office for Universal",
"product_id": "T037519",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office:for_universal"
}
}
}
],
"category": "product_name",
"name": "Office"
},
{
"category": "product_name",
"name": "Microsoft Office 2019",
"product": {
"name": "Microsoft Office 2019",
"product_id": "T037520",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office_2019:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Office Online Server",
"product": {
"name": "Microsoft Office Online Server",
"product_id": "T037521",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office_online_server:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "for iOS",
"product": {
"name": "Microsoft Outlook for iOS",
"product_id": "T014535",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:outlook:for_ios"
}
}
}
],
"category": "product_name",
"name": "Outlook"
},
{
"category": "product_name",
"name": "Microsoft Publisher 2016",
"product": {
"name": "Microsoft Publisher 2016",
"product_id": "T037522",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:publisher_2016:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Enterprise Server 2016",
"product": {
"name": "Microsoft SharePoint Enterprise Server 2016",
"product_id": "T037525",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint:enterprise_server_2016"
}
}
},
{
"category": "product_version",
"name": "Server Subscription Edition",
"product": {
"name": "Microsoft SharePoint Server Subscription Edition",
"product_id": "T037526",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint:server_subscription_edition"
}
}
}
],
"category": "product_name",
"name": "SharePoint"
},
{
"category": "product_name",
"name": "Microsoft SharePoint Server 2019",
"product": {
"name": "Microsoft SharePoint Server 2019",
"product_id": "T037527",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint_server_2019:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visio 2016",
"product": {
"name": "Microsoft Visio 2016",
"product_id": "T037528",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visio_2016:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38018",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38018"
},
{
"cve": "CVE-2024-38227",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38227"
},
{
"cve": "CVE-2024-38228",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38228"
},
{
"cve": "CVE-2024-38250",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38250"
},
{
"cve": "CVE-2024-43463",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43463"
},
{
"cve": "CVE-2024-43464",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43464"
},
{
"cve": "CVE-2024-43465",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43465"
},
{
"cve": "CVE-2024-43466",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43466"
},
{
"cve": "CVE-2024-43482",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43482"
},
{
"cve": "CVE-2024-43492",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43492"
},
{
"cve": "CVE-2024-38226",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Dieser Fehler besteht in Microsoft Publisher aufgrund einer schwachen Durchsetzung von Makrorichtlinien, die dazu entwickelt wurden, nicht vertrauensw\u00fcrdige oder b\u00f6sartige Dateien zu blockieren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion. Das Opfer muss durch Social Engineering dazu gebracht werden, eine speziell gestaltete Datei von einer Website herunterzuladen und zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38226"
}
]
}
wid-sec-w-2024-2123
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Windows ist ein Betriebssystem von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in mehreren Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2123 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2123.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2123 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2123"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-09-10",
"url": "https://msrc.microsoft.com/update-guide"
},
{
"category": "external",
"summary": "Microsoft Update Guide vom 2024-09-10",
"url": "https://msrc.microsoft.com/update-guidehttps://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-43461"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2024-309 vom 2024-10-11",
"url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2024/09.html"
}
],
"source_lang": "en-US",
"title": "Microsoft Windows: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-10-10T22:00:00.000+00:00",
"generator": {
"date": "2024-10-11T08:12:11.929+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-2123",
"initial_release_date": "2024-09-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-09-15T22:00:00.000+00:00",
"number": "2",
"summary": "Aktive Ausnutzung gemeldet"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HITACHI aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Virtual Storage Platform",
"product": {
"name": "Hitachi Storage Virtual Storage Platform",
"product_id": "T020487",
"product_identification_helper": {
"cpe": "cpe:/h:hitachi:storage:virtual_storage_platform"
}
}
}
],
"category": "product_name",
"name": "Storage"
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows 10",
"product": {
"name": "Microsoft Windows 10",
"product_id": "T037529",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:-"
}
}
},
{
"category": "product_version",
"name": "Version 1607",
"product": {
"name": "Microsoft Windows 10 Version 1607",
"product_id": "T037530",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1607"
}
}
},
{
"category": "product_version",
"name": "Version 1809",
"product": {
"name": "Microsoft Windows 10 Version 1809",
"product_id": "T037531",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1809"
}
}
},
{
"category": "product_version",
"name": "Version 21H2",
"product": {
"name": "Microsoft Windows 10 Version 21H2",
"product_id": "T037532",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_21h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 10 Version 22H2",
"product_id": "T037533",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_22h2"
}
}
}
],
"category": "product_name",
"name": "Windows 10"
},
{
"branches": [
{
"category": "product_version",
"name": "Version 23H2",
"product": {
"name": "Microsoft Windows 11 Version 23H2",
"product_id": "T031172",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_23h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 11 Version 22H2",
"product_id": "T037534",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_22h2"
}
}
},
{
"category": "product_version",
"name": "Version 24H2",
"product": {
"name": "Microsoft Windows 11 Version 24H2",
"product_id": "T037535",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_24h2"
}
}
},
{
"category": "product_version_range",
"name": "version 21H2",
"product": {
"name": "Microsoft Windows 11 version 21H2",
"product_id": "T037536"
}
}
],
"category": "product_name",
"name": "Windows 11"
},
{
"branches": [
{
"category": "product_version",
"name": "2008 R2 SP1",
"product": {
"name": "Microsoft Windows Server 2008 R2 SP1",
"product_id": "T037537",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_r2_sp1"
}
}
},
{
"category": "product_version",
"name": "2008 SP2",
"product": {
"name": "Microsoft Windows Server 2008 SP2",
"product_id": "T037538",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_sp2"
}
}
}
],
"category": "product_name",
"name": "Windows Server"
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012",
"product": {
"name": "Microsoft Windows Server 2012",
"product_id": "T037539",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "T037544",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012_r2:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T037543",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2019",
"product": {
"name": "Microsoft Windows Server 2019",
"product_id": "T037542",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2019:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows Server 2022",
"product": {
"name": "Microsoft Windows Server 2022",
"product_id": "T037545",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:-"
}
}
},
{
"category": "product_version",
"name": "23H2 Edition",
"product": {
"name": "Microsoft Windows Server 2022 23H2 Edition",
"product_id": "T037547",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:23h2_edition"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21416",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-21416"
},
{
"cve": "CVE-2024-30073",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-30073"
},
{
"cve": "CVE-2024-38045",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38045"
},
{
"cve": "CVE-2024-38046",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38046"
},
{
"cve": "CVE-2024-38119",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38119"
},
{
"cve": "CVE-2024-38230",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38230"
},
{
"cve": "CVE-2024-38231",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38231"
},
{
"cve": "CVE-2024-38232",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38232"
},
{
"cve": "CVE-2024-38233",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38233"
},
{
"cve": "CVE-2024-38234",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38234"
},
{
"cve": "CVE-2024-38235",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38235"
},
{
"cve": "CVE-2024-38236",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38236"
},
{
"cve": "CVE-2024-38237",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38237"
},
{
"cve": "CVE-2024-38238",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38238"
},
{
"cve": "CVE-2024-38239",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38239"
},
{
"cve": "CVE-2024-38240",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38240"
},
{
"cve": "CVE-2024-38241",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38241"
},
{
"cve": "CVE-2024-38242",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38242"
},
{
"cve": "CVE-2024-38243",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38243"
},
{
"cve": "CVE-2024-38244",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38244"
},
{
"cve": "CVE-2024-38245",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38245"
},
{
"cve": "CVE-2024-38246",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38246"
},
{
"cve": "CVE-2024-38247",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38247"
},
{
"cve": "CVE-2024-38248",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38248"
},
{
"cve": "CVE-2024-38249",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38249"
},
{
"cve": "CVE-2024-38250",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38250"
},
{
"cve": "CVE-2024-38252",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38252"
},
{
"cve": "CVE-2024-38253",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38253"
},
{
"cve": "CVE-2024-38254",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38254"
},
{
"cve": "CVE-2024-38256",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38256"
},
{
"cve": "CVE-2024-38257",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38257"
},
{
"cve": "CVE-2024-38258",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38258"
},
{
"cve": "CVE-2024-38259",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38259"
},
{
"cve": "CVE-2024-38260",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38260"
},
{
"cve": "CVE-2024-38263",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38263"
},
{
"cve": "CVE-2024-43454",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43454"
},
{
"cve": "CVE-2024-43455",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43455"
},
{
"cve": "CVE-2024-43457",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43457"
},
{
"cve": "CVE-2024-43458",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43458"
},
{
"cve": "CVE-2024-43461",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43461"
},
{
"cve": "CVE-2024-43467",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43467"
},
{
"cve": "CVE-2024-43475",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43475"
},
{
"cve": "CVE-2024-43487",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43487"
},
{
"cve": "CVE-2024-43495",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43495"
},
{
"cve": "CVE-2024-38014",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 besteht eine Schwachstelle. Diese Schwachstelle betrifft den Windows Installer. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Rechte auf SYSTEM-Ebene zu erlangen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38014"
},
{
"cve": "CVE-2024-38217",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 besteht eine Schwachstelle. Dieser Fehler ist auf eine unzureichende Durchsetzung der Sicherheitsfunktion \"Mark of the Web\" (MOTW) zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um die Sicherheitskontrollen zu umgehen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion, bei der ein Benutzer zum Herunterladen und \u00d6ffnen einer b\u00f6sartigen Datei verleitet werden muss."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38217"
},
{
"cve": "CVE-2024-43491",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 besteht eine Schwachstelle. Dieser Fehler betrifft den Windows Update-Servicestack. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43491"
}
]
}
WID-SEC-W-2024-2121
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Microsoft 365 Apps ist eine Office Suite f\u00fcr zahlreiche B\u00fcroanwendungen.\r\nExcel ist ein Tabellenkalkulationsprogramm der Microsoft Office Suite und ist sowohl f\u00fcr Microsoft Windows als auch f\u00fcr Mac OS verf\u00fcgbar.\r\nDie Microsoft Office Suite beinhaltet zahlreiche B\u00fcroanwendungen wie Textverarbeitung, Tabellenkalkulation, Datenbank und weitere Applikationen.\r\nMicrosoft Office Online Server ist ein Serverprodukt, das browserbasierte Versionen von Word, PowerPoint, Excel und OneNote bereitstellt. \r\nOutlook ist ein Personal Information Manager von Microsoft und ist Bestandteil der Office Suite.\r\nDer Microsoft Publishers ist ein Programm zum Erstellen von Druckpublikationen, Websites, E-Mail-Headlines und Produktpr\u00e4sentationen.\r\nMicrosoft Sharepoint Services ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u.a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Sharepoint ist ein Portalsystem f\u00fcr die zentrale Verwaltung von Dokumenten und Anwendungen. Die Inhalte werden u. a. \u00fcber Webseiten zur Verf\u00fcgung gestellt.\r\nMicrosoft Visio ist eine Visualisierungs-Software zur Darstellung von Flu\u00dfdiagrammen, Netzpl\u00e4nen oder Organisationsdiagrammen. Microsoft Visio ist eigenst\u00e4ndiger Bestandteil des Microsoft-Office-Systems.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 ausnutzen, um seine Privilegien zu erh\u00f6hen, Sicherheitsma\u00dfnahmen zu umgehen und beliebigen Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2121 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2121.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2121 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2121"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-09-10",
"url": "https://msrc.microsoft.com/update-guide"
}
],
"source_lang": "en-US",
"title": "Microsoft Office: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-09-10T22:00:00.000+00:00",
"generator": {
"date": "2024-09-11T10:38:46.526+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-2121",
"initial_release_date": "2024-09-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft 365 Apps",
"product": {
"name": "Microsoft 365 Apps",
"product_id": "T037514",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:365_apps:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Excel 2016",
"product": {
"name": "Microsoft Excel 2016",
"product_id": "T037515",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:excel_2016:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "LTSC 2021",
"product": {
"name": "Microsoft Office LTSC 2021",
"product_id": "T037516",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office:ltsc_2021"
}
}
},
{
"category": "product_version",
"name": "LTSC for Mac 2021",
"product": {
"name": "Microsoft Office LTSC for Mac 2021",
"product_id": "T037517",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office:ltsc_for_mac_2021"
}
}
},
{
"category": "product_version",
"name": "for Android",
"product": {
"name": "Microsoft Office for Android",
"product_id": "T037518",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office:for_android"
}
}
},
{
"category": "product_version",
"name": "for Universal",
"product": {
"name": "Microsoft Office for Universal",
"product_id": "T037519",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office:for_universal"
}
}
}
],
"category": "product_name",
"name": "Office"
},
{
"category": "product_name",
"name": "Microsoft Office 2019",
"product": {
"name": "Microsoft Office 2019",
"product_id": "T037520",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office_2019:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Office Online Server",
"product": {
"name": "Microsoft Office Online Server",
"product_id": "T037521",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:office_online_server:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "for iOS",
"product": {
"name": "Microsoft Outlook for iOS",
"product_id": "T014535",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:outlook:for_ios"
}
}
}
],
"category": "product_name",
"name": "Outlook"
},
{
"category": "product_name",
"name": "Microsoft Publisher 2016",
"product": {
"name": "Microsoft Publisher 2016",
"product_id": "T037522",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:publisher_2016:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Enterprise Server 2016",
"product": {
"name": "Microsoft SharePoint Enterprise Server 2016",
"product_id": "T037525",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint:enterprise_server_2016"
}
}
},
{
"category": "product_version",
"name": "Server Subscription Edition",
"product": {
"name": "Microsoft SharePoint Server Subscription Edition",
"product_id": "T037526",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint:server_subscription_edition"
}
}
}
],
"category": "product_name",
"name": "SharePoint"
},
{
"category": "product_name",
"name": "Microsoft SharePoint Server 2019",
"product": {
"name": "Microsoft SharePoint Server 2019",
"product_id": "T037527",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:sharepoint_server_2019:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Visio 2016",
"product": {
"name": "Microsoft Visio 2016",
"product_id": "T037528",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:visio_2016:-"
}
}
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38018",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38018"
},
{
"cve": "CVE-2024-38227",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38227"
},
{
"cve": "CVE-2024-38228",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38228"
},
{
"cve": "CVE-2024-38250",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38250"
},
{
"cve": "CVE-2024-43463",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43463"
},
{
"cve": "CVE-2024-43464",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43464"
},
{
"cve": "CVE-2024-43465",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43465"
},
{
"cve": "CVE-2024-43466",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43466"
},
{
"cve": "CVE-2024-43482",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43482"
},
{
"cve": "CVE-2024-43492",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Diese Fehler, die verschiedene Komponenten betreffen, sind zum jetzigen Zeitpunkt noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung von Administratorrechten, und beliebigen Code auszuf\u00fchren. Einige dieser Schwachstellen erfordern erh\u00f6hte Berechtigungen und Benutzerinteraktion, um erfolgreich ausgenutzt zu werden."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43492"
},
{
"cve": "CVE-2024-38226",
"notes": [
{
"category": "description",
"text": "In Microsoft 365 Apps, Microsoft Excel 2016, Microsoft Office, Microsoft Office 2019, Microsoft Office Online Server, Microsoft Outlook, Microsoft Publisher 2016, Microsoft SharePoint, Microsoft SharePoint Server 2019 und Microsoft Visio 2016 bestehen mehrere Schwachstellen. Dieser Fehler besteht in Microsoft Publisher aufgrund einer schwachen Durchsetzung von Makrorichtlinien, die dazu entwickelt wurden, nicht vertrauensw\u00fcrdige oder b\u00f6sartige Dateien zu blockieren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion. Das Opfer muss durch Social Engineering dazu gebracht werden, eine speziell gestaltete Datei von einer Website herunterzuladen und zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"T037518",
"T037519",
"T037514",
"T037525",
"T037515",
"T037526",
"T014535",
"T037516",
"T037527",
"T037517",
"T037528",
"T037521",
"T037522",
"T037520"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38226"
}
]
}
WID-SEC-W-2024-2123
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Windows ist ein Betriebssystem von Microsoft.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in mehreren Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-2123 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-2123.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-2123 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-2123"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates vom 2024-09-10",
"url": "https://msrc.microsoft.com/update-guide"
},
{
"category": "external",
"summary": "Microsoft Update Guide vom 2024-09-10",
"url": "https://msrc.microsoft.com/update-guidehttps://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-43461"
},
{
"category": "external",
"summary": "Hitachi Vulnerability Information HITACHI-SEC-2024-309 vom 2024-10-11",
"url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2024/09.html"
}
],
"source_lang": "en-US",
"title": "Microsoft Windows: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-10-10T22:00:00.000+00:00",
"generator": {
"date": "2024-10-11T08:12:11.929+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-2123",
"initial_release_date": "2024-09-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-09-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-09-15T22:00:00.000+00:00",
"number": "2",
"summary": "Aktive Ausnutzung gemeldet"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von HITACHI aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Virtual Storage Platform",
"product": {
"name": "Hitachi Storage Virtual Storage Platform",
"product_id": "T020487",
"product_identification_helper": {
"cpe": "cpe:/h:hitachi:storage:virtual_storage_platform"
}
}
}
],
"category": "product_name",
"name": "Storage"
}
],
"category": "vendor",
"name": "Hitachi"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows 10",
"product": {
"name": "Microsoft Windows 10",
"product_id": "T037529",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:-"
}
}
},
{
"category": "product_version",
"name": "Version 1607",
"product": {
"name": "Microsoft Windows 10 Version 1607",
"product_id": "T037530",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1607"
}
}
},
{
"category": "product_version",
"name": "Version 1809",
"product": {
"name": "Microsoft Windows 10 Version 1809",
"product_id": "T037531",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_1809"
}
}
},
{
"category": "product_version",
"name": "Version 21H2",
"product": {
"name": "Microsoft Windows 10 Version 21H2",
"product_id": "T037532",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_21h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 10 Version 22H2",
"product_id": "T037533",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_10:version_22h2"
}
}
}
],
"category": "product_name",
"name": "Windows 10"
},
{
"branches": [
{
"category": "product_version",
"name": "Version 23H2",
"product": {
"name": "Microsoft Windows 11 Version 23H2",
"product_id": "T031172",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_23h2"
}
}
},
{
"category": "product_version",
"name": "Version 22H2",
"product": {
"name": "Microsoft Windows 11 Version 22H2",
"product_id": "T037534",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_22h2"
}
}
},
{
"category": "product_version",
"name": "Version 24H2",
"product": {
"name": "Microsoft Windows 11 Version 24H2",
"product_id": "T037535",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_11:version_24h2"
}
}
},
{
"category": "product_version_range",
"name": "version 21H2",
"product": {
"name": "Microsoft Windows 11 version 21H2",
"product_id": "T037536"
}
}
],
"category": "product_name",
"name": "Windows 11"
},
{
"branches": [
{
"category": "product_version",
"name": "2008 R2 SP1",
"product": {
"name": "Microsoft Windows Server 2008 R2 SP1",
"product_id": "T037537",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_r2_sp1"
}
}
},
{
"category": "product_version",
"name": "2008 SP2",
"product": {
"name": "Microsoft Windows Server 2008 SP2",
"product_id": "T037538",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server:2008_sp2"
}
}
}
],
"category": "product_name",
"name": "Windows Server"
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012",
"product": {
"name": "Microsoft Windows Server 2012",
"product_id": "T037539",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2012 R2",
"product": {
"name": "Microsoft Windows Server 2012 R2",
"product_id": "T037544",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2012_r2:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2016",
"product": {
"name": "Microsoft Windows Server 2016",
"product_id": "T037543",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2016:-"
}
}
},
{
"category": "product_name",
"name": "Microsoft Windows Server 2019",
"product": {
"name": "Microsoft Windows Server 2019",
"product_id": "T037542",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2019:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Microsoft Windows Server 2022",
"product": {
"name": "Microsoft Windows Server 2022",
"product_id": "T037545",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:-"
}
}
},
{
"category": "product_version",
"name": "23H2 Edition",
"product": {
"name": "Microsoft Windows Server 2022 23H2 Edition",
"product_id": "T037547",
"product_identification_helper": {
"cpe": "cpe:/o:microsoft:windows_server_2022:23h2_edition"
}
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
}
],
"category": "vendor",
"name": "Microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-21416",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-21416"
},
{
"cve": "CVE-2024-30073",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-30073"
},
{
"cve": "CVE-2024-38045",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38045"
},
{
"cve": "CVE-2024-38046",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38046"
},
{
"cve": "CVE-2024-38119",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38119"
},
{
"cve": "CVE-2024-38230",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38230"
},
{
"cve": "CVE-2024-38231",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38231"
},
{
"cve": "CVE-2024-38232",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38232"
},
{
"cve": "CVE-2024-38233",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38233"
},
{
"cve": "CVE-2024-38234",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38234"
},
{
"cve": "CVE-2024-38235",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38235"
},
{
"cve": "CVE-2024-38236",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38236"
},
{
"cve": "CVE-2024-38237",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38237"
},
{
"cve": "CVE-2024-38238",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38238"
},
{
"cve": "CVE-2024-38239",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38239"
},
{
"cve": "CVE-2024-38240",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38240"
},
{
"cve": "CVE-2024-38241",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38241"
},
{
"cve": "CVE-2024-38242",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38242"
},
{
"cve": "CVE-2024-38243",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38243"
},
{
"cve": "CVE-2024-38244",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38244"
},
{
"cve": "CVE-2024-38245",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38245"
},
{
"cve": "CVE-2024-38246",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38246"
},
{
"cve": "CVE-2024-38247",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38247"
},
{
"cve": "CVE-2024-38248",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38248"
},
{
"cve": "CVE-2024-38249",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38249"
},
{
"cve": "CVE-2024-38250",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38250"
},
{
"cve": "CVE-2024-38252",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38252"
},
{
"cve": "CVE-2024-38253",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38253"
},
{
"cve": "CVE-2024-38254",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38254"
},
{
"cve": "CVE-2024-38256",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38256"
},
{
"cve": "CVE-2024-38257",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38257"
},
{
"cve": "CVE-2024-38258",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38258"
},
{
"cve": "CVE-2024-38259",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38259"
},
{
"cve": "CVE-2024-38260",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38260"
},
{
"cve": "CVE-2024-38263",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38263"
},
{
"cve": "CVE-2024-43454",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43454"
},
{
"cve": "CVE-2024-43455",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43455"
},
{
"cve": "CVE-2024-43457",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43457"
},
{
"cve": "CVE-2024-43458",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43458"
},
{
"cve": "CVE-2024-43461",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43461"
},
{
"cve": "CVE-2024-43467",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43467"
},
{
"cve": "CVE-2024-43475",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43475"
},
{
"cve": "CVE-2024-43487",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43487"
},
{
"cve": "CVE-2024-43495",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 bestehen mehrere Schwachstellen. Diese Fehler, die mehrere Komponenten betreffen, sind derzeit noch nicht im Detail beschrieben worden. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte zu erlangen, einschlie\u00dflich der Erlangung administrativer Rechte, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, einen Denial-of-Service-Zustand zu erzeugen, Sicherheitsma\u00dfnahmen zu umgehen und Plattform- und Service-Spoofing durchzuf\u00fchren. Einige der Schwachstellen erfordern erh\u00f6hte Rechte und Benutzerinteraktion, um erfolgreich ausgenutzt werden zu k\u00f6nnen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43495"
},
{
"cve": "CVE-2024-38014",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 besteht eine Schwachstelle. Diese Schwachstelle betrifft den Windows Installer. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Rechte auf SYSTEM-Ebene zu erlangen."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38014"
},
{
"cve": "CVE-2024-38217",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 besteht eine Schwachstelle. Dieser Fehler ist auf eine unzureichende Durchsetzung der Sicherheitsfunktion \"Mark of the Web\" (MOTW) zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um die Sicherheitskontrollen zu umgehen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion, bei der ein Benutzer zum Herunterladen und \u00d6ffnen einer b\u00f6sartigen Datei verleitet werden muss."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-38217"
},
{
"cve": "CVE-2024-43491",
"notes": [
{
"category": "description",
"text": "In Microsoft Windows 10, Microsoft Windows 11, Microsoft Windows Server, Microsoft Windows Server 2012, Microsoft Windows Server 2012 R2, Microsoft Windows Server 2016, Microsoft Windows Server 2019 und Microsoft Windows Server 2022 besteht eine Schwachstelle. Dieser Fehler betrifft den Windows Update-Servicestack. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um beliebigen Code auszuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T037529",
"T037536",
"T037547",
"T037537",
"T037538",
"T037539",
"T037532",
"T037543",
"T037533",
"T037544",
"T037534",
"T037545",
"T031172",
"T037535",
"T037530",
"T037531",
"T037542",
"T020487"
]
},
"release_date": "2024-09-10T22:00:00.000+00:00",
"title": "CVE-2024-43491"
}
]
}
ghsa-5536-r29g-pv75
Vulnerability from github
Windows Graphics Component Elevation of Privilege Vulnerability
{
"affected": [],
"aliases": [
"CVE-2024-38250"
],
"database_specific": {
"cwe_ids": [
"CWE-126"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-09-10T17:15:30Z",
"severity": "HIGH"
},
"details": "Windows Graphics Component Elevation of Privilege Vulnerability",
"id": "GHSA-5536-r29g-pv75",
"modified": "2024-09-10T18:30:46Z",
"published": "2024-09-10T18:30:46Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38250"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
msrc_cve-2024-38250
Vulnerability from csaf_microsoft
Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Malu Harten"
]
},
{
"names": [
"Cristi Dudescu"
]
},
{
"names": [
"Cristi Dudescu"
]
},
{
"names": [
"Cristi Dudescu"
]
},
{
"names": [
"Cristi Dudescu"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38250 Windows Graphics Component Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"
},
{
"category": "self",
"summary": "CVE-2024-38250 Windows Graphics Component Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/2024/msrc_cve-2024-38250.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Windows Graphics Component Elevation of Privilege Vulnerability",
"tracking": {
"current_release_date": "2024-09-19T07:00:00.000Z",
"generator": {
"date": "2024-12-31T23:02:29.774Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-38250",
"initial_release_date": "2024-09-10T07:00:00.000Z",
"revision_history": [
{
"date": "2024-09-10T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-09-19T07:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added acknowledgements. This is an informational change only."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.17763.6293",
"product": {
"name": "Windows 10 Version 1809 for 32-bit Systems \u003c10.0.17763.6293",
"product_id": "22"
}
},
{
"category": "product_version",
"name": "10.0.17763.6293",
"product": {
"name": "Windows 10 Version 1809 for 32-bit Systems 10.0.17763.6293",
"product_id": "11568"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 1809 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.17763.6293",
"product": {
"name": "Windows 10 Version 1809 for x64-based Systems \u003c10.0.17763.6293",
"product_id": "21"
}
},
{
"category": "product_version",
"name": "10.0.17763.6293",
"product": {
"name": "Windows 10 Version 1809 for x64-based Systems 10.0.17763.6293",
"product_id": "11569"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 1809 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.17763.6293",
"product": {
"name": "Windows Server 2019 \u003c10.0.17763.6293",
"product_id": "20"
}
},
{
"category": "product_version",
"name": "10.0.17763.6293",
"product": {
"name": "Windows Server 2019 10.0.17763.6293",
"product_id": "11571"
}
}
],
"category": "product_name",
"name": "Windows Server 2019"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.17763.6293",
"product": {
"name": "Windows Server 2019 (Server Core installation) \u003c10.0.17763.6293",
"product_id": "19"
}
},
{
"category": "product_version",
"name": "10.0.17763.6293",
"product": {
"name": "Windows Server 2019 (Server Core installation) 10.0.17763.6293",
"product_id": "11572"
}
}
],
"category": "product_name",
"name": "Windows Server 2019 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.20348.2700",
"product": {
"name": "Windows Server 2022 \u003c10.0.20348.2700",
"product_id": "18"
}
},
{
"category": "product_version",
"name": "10.0.20348.2700",
"product": {
"name": "Windows Server 2022 10.0.20348.2700",
"product_id": "11923"
}
}
],
"category": "product_name",
"name": "Windows Server 2022"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.20348.2700",
"product": {
"name": "Windows Server 2022 (Server Core installation) \u003c10.0.20348.2700",
"product_id": "17"
}
},
{
"category": "product_version",
"name": "10.0.20348.2700",
"product": {
"name": "Windows Server 2022 (Server Core installation) 10.0.20348.2700",
"product_id": "11924"
}
}
],
"category": "product_name",
"name": "Windows Server 2022 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.22000.3197",
"product": {
"name": "Windows 11 version 21H2 for x64-based Systems \u003c10.0.22000.3197",
"product_id": "16"
}
},
{
"category": "product_version",
"name": "10.0.22000.3197",
"product": {
"name": "Windows 11 version 21H2 for x64-based Systems 10.0.22000.3197",
"product_id": "11926"
}
}
],
"category": "product_name",
"name": "Windows 11 version 21H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.22000.3197",
"product": {
"name": "Windows 11 version 21H2 for ARM64-based Systems \u003c10.0.22000.3197",
"product_id": "15"
}
},
{
"category": "product_version",
"name": "10.0.22000.3197",
"product": {
"name": "Windows 11 version 21H2 for ARM64-based Systems 10.0.22000.3197",
"product_id": "11927"
}
}
],
"category": "product_name",
"name": "Windows 11 version 21H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19044.4894",
"product": {
"name": "Windows 10 Version 21H2 for 32-bit Systems \u003c10.0.19044.4894",
"product_id": "14"
}
},
{
"category": "product_version",
"name": "10.0.19044.4894",
"product": {
"name": "Windows 10 Version 21H2 for 32-bit Systems 10.0.19044.4894",
"product_id": "11929"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19044.4894",
"product": {
"name": "Windows 10 Version 21H2 for ARM64-based Systems \u003c10.0.19044.4894",
"product_id": "13"
}
},
{
"category": "product_version",
"name": "10.0.19044.4894",
"product": {
"name": "Windows 10 Version 21H2 for ARM64-based Systems 10.0.19044.4894",
"product_id": "11930"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19044.4894",
"product": {
"name": "Windows 10 Version 21H2 for x64-based Systems \u003c10.0.19044.4894",
"product_id": "12"
}
},
{
"category": "product_version",
"name": "10.0.19044.4894",
"product": {
"name": "Windows 10 Version 21H2 for x64-based Systems 10.0.19044.4894",
"product_id": "11931"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 21H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.22621.4169",
"product": {
"name": "Windows 11 Version 22H2 for ARM64-based Systems \u003c10.0.22621.4169",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "10.0.22621.4169",
"product": {
"name": "Windows 11 Version 22H2 for ARM64-based Systems 10.0.22621.4169",
"product_id": "12085"
}
}
],
"category": "product_name",
"name": "Windows 11 Version 22H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.22621.4169",
"product": {
"name": "Windows 11 Version 22H2 for x64-based Systems \u003c10.0.22621.4169",
"product_id": "9"
}
},
{
"category": "product_version",
"name": "10.0.22621.4169",
"product": {
"name": "Windows 11 Version 22H2 for x64-based Systems 10.0.22621.4169",
"product_id": "12086"
}
}
],
"category": "product_name",
"name": "Windows 11 Version 22H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19045.4894",
"product": {
"name": "Windows 10 Version 22H2 for x64-based Systems \u003c10.0.19045.4894",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "10.0.19045.4894",
"product": {
"name": "Windows 10 Version 22H2 for x64-based Systems 10.0.19045.4894",
"product_id": "12097"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 22H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19045.4894",
"product": {
"name": "Windows 10 Version 22H2 for ARM64-based Systems \u003c10.0.19045.4894",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "10.0.19045.4894",
"product": {
"name": "Windows 10 Version 22H2 for ARM64-based Systems 10.0.19045.4894",
"product_id": "12098"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 22H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.19045.4894",
"product": {
"name": "Windows 10 Version 22H2 for 32-bit Systems \u003c10.0.19045.4894",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "10.0.19045.4894",
"product": {
"name": "Windows 10 Version 22H2 for 32-bit Systems 10.0.19045.4894",
"product_id": "12099"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 22H2 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.22631.4169",
"product": {
"name": "Windows 11 Version 23H2 for ARM64-based Systems \u003c10.0.22631.4169",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "10.0.22631.4169",
"product": {
"name": "Windows 11 Version 23H2 for ARM64-based Systems 10.0.22631.4169",
"product_id": "12242"
}
}
],
"category": "product_name",
"name": "Windows 11 Version 23H2 for ARM64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.22631.4169",
"product": {
"name": "Windows 11 Version 23H2 for x64-based Systems \u003c10.0.22631.4169",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "10.0.22631.4169",
"product": {
"name": "Windows 11 Version 23H2 for x64-based Systems 10.0.22631.4169",
"product_id": "12243"
}
}
],
"category": "product_name",
"name": "Windows 11 Version 23H2 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.25398.1128",
"product": {
"name": "Windows Server 2022, 23H2 Edition (Server Core installation) \u003c10.0.25398.1128",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "10.0.25398.1128",
"product": {
"name": "Windows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.1128",
"product_id": "12244"
}
}
],
"category": "product_name",
"name": "Windows Server 2022, 23H2 Edition (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.10240.20766",
"product": {
"name": "Windows 10 for 32-bit Systems \u003c10.0.10240.20766",
"product_id": "28"
}
},
{
"category": "product_version",
"name": "10.0.10240.20766",
"product": {
"name": "Windows 10 for 32-bit Systems 10.0.10240.20766",
"product_id": "10729"
}
}
],
"category": "product_name",
"name": "Windows 10 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.10240.20766",
"product": {
"name": "Windows 10 for x64-based Systems \u003c10.0.10240.20766",
"product_id": "27"
}
},
{
"category": "product_version",
"name": "10.0.10240.20766",
"product": {
"name": "Windows 10 for x64-based Systems 10.0.10240.20766",
"product_id": "10735"
}
}
],
"category": "product_name",
"name": "Windows 10 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.14393.7336",
"product": {
"name": "Windows 10 Version 1607 for 32-bit Systems \u003c10.0.14393.7336",
"product_id": "25"
}
},
{
"category": "product_version",
"name": "10.0.14393.7336",
"product": {
"name": "Windows 10 Version 1607 for 32-bit Systems 10.0.14393.7336",
"product_id": "10852"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 1607 for 32-bit Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.14393.7336",
"product": {
"name": "Windows 10 Version 1607 for x64-based Systems \u003c10.0.14393.7336",
"product_id": "24"
}
},
{
"category": "product_version",
"name": "10.0.14393.7336",
"product": {
"name": "Windows 10 Version 1607 for x64-based Systems 10.0.14393.7336",
"product_id": "10853"
}
}
],
"category": "product_name",
"name": "Windows 10 Version 1607 for x64-based Systems"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.14393.7336",
"product": {
"name": "Windows Server 2016 \u003c10.0.14393.7336",
"product_id": "26"
}
},
{
"category": "product_version",
"name": "10.0.14393.7336",
"product": {
"name": "Windows Server 2016 10.0.14393.7336",
"product_id": "10816"
}
}
],
"category": "product_name",
"name": "Windows Server 2016"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.14393.7336",
"product": {
"name": "Windows Server 2016 (Server Core installation) \u003c10.0.14393.7336",
"product_id": "23"
}
},
{
"category": "product_version",
"name": "10.0.14393.7336",
"product": {
"name": "Windows Server 2016 (Server Core installation) 10.0.14393.7336",
"product_id": "10855"
}
}
],
"category": "product_name",
"name": "Windows Server 2016 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.6003.22870",
"product": {
"name": "Windows Server 2008 for 32-bit Systems Service Pack 2 \u003c6.0.6003.22870",
"product_id": "38"
}
},
{
"category": "product_version",
"name": "6.0.6003.22870",
"product": {
"name": "Windows Server 2008 for 32-bit Systems Service Pack 2 6.0.6003.22870",
"product_id": "9312"
}
}
],
"category": "product_name",
"name": "Windows Server 2008 for 32-bit Systems Service Pack 2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.6003.22870",
"product": {
"name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \u003c6.0.6003.22870",
"product_id": "33"
}
},
{
"category": "product_version",
"name": "6.0.6003.22870",
"product": {
"name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) 6.0.6003.22870",
"product_id": "10287"
}
}
],
"category": "product_name",
"name": "Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.6003.22870",
"product": {
"name": "Windows Server 2008 for x64-based Systems Service Pack 2 \u003c6.0.6003.22870",
"product_id": "37"
}
},
{
"category": "product_version",
"name": "6.0.6003.22870",
"product": {
"name": "Windows Server 2008 for x64-based Systems Service Pack 2 6.0.6003.22870",
"product_id": "9318"
}
}
],
"category": "product_name",
"name": "Windows Server 2008 for x64-based Systems Service Pack 2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.0.6003.22870",
"product": {
"name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \u003c6.0.6003.22870",
"product_id": "36"
}
},
{
"category": "product_version",
"name": "6.0.6003.22870",
"product": {
"name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) 6.0.6003.22870",
"product_id": "9344"
}
}
],
"category": "product_name",
"name": "Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.7601.27320",
"product": {
"name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 \u003c6.1.7601.27320",
"product_id": "34"
}
},
{
"category": "product_version",
"name": "6.1.7601.27320",
"product": {
"name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 6.1.7601.27320",
"product_id": "10051"
}
}
],
"category": "product_name",
"name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.7601.27320",
"product": {
"name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \u003c6.1.7601.27320",
"product_id": "35"
}
},
{
"category": "product_version",
"name": "6.1.7601.27320",
"product": {
"name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) 6.1.7601.27320",
"product_id": "10049"
}
}
],
"category": "product_name",
"name": "Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.2.9200.25073",
"product": {
"name": "Windows Server 2012 \u003c6.2.9200.25073",
"product_id": "32"
}
},
{
"category": "product_version",
"name": "6.2.9200.25073",
"product": {
"name": "Windows Server 2012 6.2.9200.25073",
"product_id": "10378"
}
}
],
"category": "product_name",
"name": "Windows Server 2012"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.2.9200.25073",
"product": {
"name": "Windows Server 2012 (Server Core installation) \u003c6.2.9200.25073",
"product_id": "31"
}
},
{
"category": "product_version",
"name": "6.2.9200.25073",
"product": {
"name": "Windows Server 2012 (Server Core installation) 6.2.9200.25073",
"product_id": "10379"
}
}
],
"category": "product_name",
"name": "Windows Server 2012 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.3.9600.22175",
"product": {
"name": "Windows Server 2012 R2 \u003c6.3.9600.22175",
"product_id": "30"
}
},
{
"category": "product_version",
"name": "6.3.9600.22175",
"product": {
"name": "Windows Server 2012 R2 6.3.9600.22175",
"product_id": "10483"
}
}
],
"category": "product_name",
"name": "Windows Server 2012 R2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.3.9600.22175",
"product": {
"name": "Windows Server 2012 R2 (Server Core installation) \u003c6.3.9600.22175",
"product_id": "29"
}
},
{
"category": "product_version",
"name": "6.3.9600.22175",
"product": {
"name": "Windows Server 2012 R2 (Server Core installation) 6.3.9600.22175",
"product_id": "10543"
}
}
],
"category": "product_name",
"name": "Windows Server 2012 R2 (Server Core installation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.89.24090815",
"product": {
"name": "Microsoft Office LTSC for Mac 2021 \u003c16.89.24090815",
"product_id": "11"
}
},
{
"category": "product_version",
"name": "16.89.24090815",
"product": {
"name": "Microsoft Office LTSC for Mac 2021 16.89.24090815",
"product_id": "11951"
}
}
],
"category": "product_name",
"name": "Microsoft Office LTSC for Mac 2021"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.0.16827.2xxxxx",
"product": {
"name": "Microsoft Office for Android \u003c16.0.16827.2xxxxx",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "16.0.16827.2xxxxx",
"product": {
"name": "Microsoft Office for Android 16.0.16827.2xxxxx",
"product_id": "12155"
}
}
],
"category": "product_name",
"name": "Microsoft Office for Android"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c16.0.14326.21xxxx",
"product": {
"name": "Microsoft Office for Universal \u003c16.0.14326.21xxxx",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "16.0.14326.21xxxx",
"product": {
"name": "Microsoft Office for Universal 16.0.14326.21xxxx",
"product_id": "12156"
}
}
],
"category": "product_name",
"name": "Microsoft Office for Universal"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38250",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.",
"title": "What privileges could be gained by an attacker who successfully exploited this vulnerability?"
}
],
"product_status": {
"fixed": [
"9312",
"9318",
"9344",
"10049",
"10051",
"10287",
"10378",
"10379",
"10483",
"10543",
"10729",
"10735",
"10816",
"10852",
"10853",
"10855",
"11568",
"11569",
"11571",
"11572",
"11923",
"11924",
"11926",
"11927",
"11929",
"11930",
"11931",
"11951",
"12085",
"12086",
"12097",
"12098",
"12099",
"12155",
"12156",
"12242",
"12243",
"12244"
],
"known_affected": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38250 Windows Graphics Component Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"
},
{
"category": "self",
"summary": "CVE-2024-38250 Windows Graphics Component Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38250"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.17763.6293:Security Update:https://support.microsoft.com/help/5043050",
"product_ids": [
"22",
"21",
"20",
"19"
],
"url": "https://support.microsoft.com/help/5043050"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.20348.2700:Security Update:https://support.microsoft.com/help/5042881",
"product_ids": [
"18",
"17"
],
"url": "https://support.microsoft.com/help/5042881"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.20348.2695:SecurityHotpatchUpdate:https://support.microsoft.com/help/5042880",
"product_ids": [
"18",
"17"
],
"url": "https://support.microsoft.com/help/5042880"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.22000.3197:Security Update:https://support.microsoft.com/help/5043067",
"product_ids": [
"16",
"15"
],
"url": "https://support.microsoft.com/help/5043067"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.19044.4894:Security Update:https://support.microsoft.com/help/5043064",
"product_ids": [
"14",
"13",
"12"
],
"url": "https://support.microsoft.com/help/5043064"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.22621.4169:Security Update:https://support.microsoft.com/help/5043076",
"product_ids": [
"10",
"9"
],
"url": "https://support.microsoft.com/help/5043076"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.19045.4894:Security Update:https://support.microsoft.com/help/5043064",
"product_ids": [
"8",
"7",
"6"
],
"url": "https://support.microsoft.com/help/5043064"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.22631.4169:Security Update:https://support.microsoft.com/help/5043076",
"product_ids": [
"3",
"2"
],
"url": "https://support.microsoft.com/help/5043076"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.25398.1128:Security Update:https://support.microsoft.com/help/5043055",
"product_ids": [
"1"
],
"url": "https://support.microsoft.com/help/5043055"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.10240.20766:Security Update:https://support.microsoft.com/help/5043083",
"product_ids": [
"28",
"27"
],
"url": "https://support.microsoft.com/help/5043083"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "10.0.14393.7336:Security Update:https://support.microsoft.com/help/5043051",
"product_ids": [
"25",
"24",
"26",
"23"
],
"url": "https://support.microsoft.com/help/5043051"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "6.0.6003.22870:Monthly Rollup:https://support.microsoft.com/help/5043135",
"product_ids": [
"38",
"33",
"37",
"36"
],
"url": "https://support.microsoft.com/help/5043135"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "6.0.6003.22870:Security Only:https://support.microsoft.com/help/5043087",
"product_ids": [
"38",
"33",
"37",
"36"
],
"url": "https://support.microsoft.com/help/5043087"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "6.1.7601.27320:Monthly Rollup:https://support.microsoft.com/help/5043129",
"product_ids": [
"34",
"35"
],
"url": "https://support.microsoft.com/help/5043129"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "6.1.7601.27320:Security Only:https://support.microsoft.com/help/5043092",
"product_ids": [
"34",
"35"
],
"url": "https://support.microsoft.com/help/5043092"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "6.2.9200.25073:Monthly Rollup:https://support.microsoft.com/help/5043125",
"product_ids": [
"32",
"31"
],
"url": "https://support.microsoft.com/help/5043125"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "6.3.9600.22175:Monthly Rollup:https://support.microsoft.com/help/5043138",
"product_ids": [
"30",
"29"
],
"url": "https://support.microsoft.com/help/5043138"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "16.89.24090815:Security Update:https://go.microsoft.com/fwlink/p/?linkid=831049",
"product_ids": [
"11"
],
"url": "https://go.microsoft.com/fwlink/p/?linkid=831049"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "16.0.16827.2xxxxx:Security Update:https://support.google.com/googleplay/answer/113412?hl=en",
"product_ids": [
"5"
],
"url": "https://support.google.com/googleplay/answer/113412?hl=en"
},
{
"category": "vendor_fix",
"date": "2024-09-10T07:00:00.000Z",
"details": "16.0.14326.21xxxx:Security Update:https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f",
"product_ids": [
"4"
],
"url": "https://support.microsoft.com/en-us/account-billing/get-updates-for-apps-and-games-in-microsoft-store-a1fe19c0-532d-ec47-7035-d1c5a1dd464f"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "UNCHANGED",
"temporalScore": 6.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2",
"3",
"4",
"5",
"6",
"7",
"8",
"9",
"10",
"11",
"12",
"13",
"14",
"15",
"16",
"17",
"18",
"19",
"20",
"21",
"22",
"23",
"24",
"25",
"26",
"27",
"28",
"29",
"30",
"31",
"32",
"33",
"34",
"35",
"36",
"37",
"38"
]
}
],
"threats": [
{
"category": "impact",
"details": "Elevation of Privilege"
},
{
"category": "exploit_status",
"details": "Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "Windows Graphics Component Elevation of Privilege Vulnerability"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.