Microsoft Patch Tuesday security updates for July 2024 addressed 139 vulnerabilities in Windows and Windows Components; Office and Office Components; .NET and Visual Studio; Azure; Defender for IoT; SQL Server; Windows Hyper-V; Bitlocker and Secure(?) Boot; Remote Desktop; and Xbox (yes Xbox!). The updates also addressed additional three issues that reside in the third-party products.
Five vulnerabilities are rated Critical, 133 are rated Important, and three are rated Moderate in severity.
Two of these vulnerabilities are listed as publicly known, and two other bugs are actively exploited in attacks.
The two flaws actively exploited in the wild are:
CVE-2024-38080 | Windows Hyper-V Elevation of Privilege Vulnerability | Important | 7.8 | No | Yes | EoP |
CVE-2024-38112 | Windows MSHTML Platform Spoofing Vulnerability | Important | 705 | No | Yes | Spoofing |
CVE-2024-38080 (CVSS score of 7.8) – the flaw is an elevation of privilege vulnerability in Windows Hyper-V. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
CVE-2024-38112 (CVSS score of 7.5) – the flaw is a Windows MSHTML Platform Spoofing Vulnerability. Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment. An attacker can trigger the issue by sending the victim a malicious file that the victim would have to execute.
The two publicly known vulnerabilities are:
CVE-2024-37985 * | Arm: CVE-2024-37985 Systematic Identification and Characterization of Proprietary Prefetchers | Important | 5.9 | Yes | No | Info |
CVE-2024-35264 | .NET and Visual Studio Remote Code Execution Vulnerability | Important | 8.1 | Yes | No | RCE |
The full list of vulnerabilities addressed by Microsoft are available here:
https://www.zerodayinitiative.com/blog/2024/7/9/the-july-2024-security-update-review
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, Microsoft Patch Tuesday)