Microsoft's August 2024 Patch Tuesday addressed 85 vulnerabilities, including six zero-day exploits. The vulnerabilities are categorized as CVE-2024-38213, CVE-2024-38193, CVE-2024-38189, CVE-2024-38178, CVE-2024-38107, and CVE-2024-38106. Six vulnerabilities are classified as Critical, while the remaining 79 are rated Important or Moderate. The predominant risk types include elevation of privilege (37%) and remote code execution (35%). Windows products received 43 patches, with 21 for the Extended Security Update (ESU) and 8 for Microsoft Office.
Notable zero-day vulnerabilities include:
- CVE-2024-38189 in Microsoft Project (CVSS 8.8) allows remote code execution.
- CVE-2024-38193 in Windows Ancillary Function Driver for WinSock (CVSS 7.8) allows privilege escalation.
- CVE-2024-38107 in Windows Power Dependency Coordinator (CVSS 7.8) allows privilege escalation.
- CVE-2024-38178 in the Scripting Engine (CVSS 7.5) allows remote code execution.
- CVE-2024-38106 in the Windows kernel (CVSS 7.0) allows privilege escalation.
- CVE-2024-38213 in Windows Mark of the Web Security (CVSS 6.5) allows security warning bypass.
Critical vulnerabilities include:
- CVE-2024-38063 (CVSS 9.8) in Windows TCP/IP allows remote code execution.
- CVE-2024-38140 (CVSS 9.8) in Windows Reliable Multicast Transport Driver allows remote code execution.
- CVE-2024-38109 (CVSS 9.1) in Azure Health Bot allows privilege escalation.
- CVE-2024-38159 and CVE-2024-38160 (both CVSS 9.1) in Windows Network Virtualization allow remote code execution.
- CVE-2023-40547 (CVSS 8.8) impacts Secure Boot.
Additional vulnerabilities with existing proof of concept include:
- CVE-2024-38199 (CVSS 9.8) in Windows Line Printer Daemon allows remote code execution.
- CVE-2024-38202 (CVSS 7.3) in Windows Update Stack allows privilege escalation.
- CVE-2024-21302 (CVSS 6.7) in Windows Secure Kernel Mode allows privilege escalation.