{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2024-067.pdf"
    },
    "title": "Multiple Vulnerabilities in Microsoft Products",
    "serial_number": "2024-067",
    "publish_date": "12-07-2024 09:43:44",
    "description": "On July 10, 2024, Microsoft addressed 139 vulnerabilities in its July 2024 Patch Tuesday update, including four zero-day vulnerabilities. Two zero-day vulnerabilities are actively exploited. Additionally, five critical vulnerabilities leading to Remote Code Execution have been patched.<br>\nIt is recommended updating as soon as possible. <br>\n",
    "url_title": "2024-067",
    "content_markdown": "---\ntitle: 'Multiple Vulnerabilities in\u00a0Microsoft\u00a0Products'\nnumber: '2024-067'\nversion: '1.1'\noriginal_date: 'July 09, 2024'\ndate: 'July 12, 2024'\n---\n\n_History:_\n\n* _10/07/2024 --- v1.0 -- Initial publication_\n* _12/07/2024 --- v1.1 -- Add information about CVE-2024-38021_\n\n# Summary\n\nOn July 10, 2024, Microsoft addressed 139 vulnerabilities in its July 2024 Patch Tuesday update, including four zero-day vulnerabilities. Two zero-day vulnerabilities are actively exploited [1,2,3]. Additionally, five critical vulnerabilities leading to Remote Code Execution have been patched.\n\nIt is recommended updating as soon as possible. \n\n# Technical Details\n\n## Zero-day Vulnerabilities\n\nThe zero-day vulnerability **CVE-2024-38080**, with a CVSS score of 7.8, allow attackers to gain `SYSTEM` privileges on the host machine, but initial local access is required to exploit the flaw, according to Microsoft [4]. This vulnerability is being exploited.\n\nThe zero-day vulnerability **CVE-2024-38112**, with a CVSS score of 7.5, is a spoofing vulnerability in Windows MSHTML Platform that can be triggered with a specially crafted HTML file [5]. Exploitation of this vulnerability likely requires the use of an \u201cattack chain\u201d of exploits or programmatic changes on the target host. This vulnerability is being exploited.\n\nThe zero-day vulnerability **CVE-2024-35264**, with a CVSS score of 8.1, is a RCE vulnerability affecting .NET and Visual Studio. According to the advisory, the attack complexity is high because some conditions are beyond the attacker's control [6].\n\nThe zero-day vulnerability **CVE-2024-37985**, with a CVSS score of 5.9, affects ARM systems. By exploiting this vulnerability, an attacker would be able to view heap memory from a privileged process running on the server [7]. According to the advisory, the attack complexity is high because some conditions are beyond the attacker's control.\n\n\n## Other Critical Vulnerabilities \n\nThe vulnerabilities  **CVE-2024-38076**, **CVE-2024-38077**, and **CVE-2024-38074**, with a CVSS score of 9.8, affect the Windows Remote Desktop Licensing Service component that manages client access licenses (CALs) for remote desktop services, and could lead to remote code execution if exploited [8,9,10].\n\nThe vulnerability **CVE-2024-38060**, with a CVSS score of 8.8, is a Windows Imaging Component Remote Code Execution Vulnerability. [11]\n\nThe vulnerability **CVE-2024-38023**, with a CVSS score of 7.2, is a Microsoft SharePoint Server Remote Code Execution Vulnerability. [12]\n\n**[New]** The vulnerability **CVE-2024-38021**, with a CVSS scode of 8.8, is a Remote Code Execution flow in Microsoft Outlook. It is not considered critical by Microsoft because it requires a one click user interaction for untrusted senders (while it does not require any user interaction for trusted sender). Attackers could exploit this vulnerability to gain unauthorised access, execute arbitrary code, and cause substantial damage without any user interaction. The absence of authentication requirements makes it particularly dangerous, as it opens the door to widespread exploitation. [13]\n\n# Affected Products\n\nAffected products include, but are not limited to, Microsoft Windows, Microsoft Server, Microsoft Office and Microsoft Sharepoint, .NET and Visual Studio, Windows Remote Desktop Licensing Service.\n\nDetailed information about each vulnerability and affected systems can be found in Microsoft's security bulletins [1]. \n\n# Recommendations\n\nIt is recommended applying updates to all affected assets as soon as possible, prioritising Internet facing devices, and devices affected by zero-day and critical vulnerabilities.\n\n# References\n\n[1] <https://msrc.microsoft.com/update-guide/releaseNote/2024-Jul>\n\n[2] <https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days/>\n\n[3] <https://krebsonsecurity.com/2024/07/microsoft-patch-tuesday-july-2024-edition/>\n\n[4] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080>\n\n[5] <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112>\n\n[6] <https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-35264>\n\n[7] <https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-37985>\n\n[8] <https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38076>\n\n[9] <https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38077>\n\n[10] <https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38074>\n\n[11] <https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38060>\n\n[12] <https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38023>\n\n[13] <https://blog.morphisec.com/cve-2024-38021-microsoft-outlook-moniker-rce-vulnerability>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>10/07/2024 --- v1.0 -- Initial publication</em></li><li><em>12/07/2024 --- v1.1 -- Add information about CVE-2024-38021</em></li></ul><h2 id=\"summary\">Summary</h2><p>On July 10, 2024, Microsoft addressed 139 vulnerabilities in its July 2024 Patch Tuesday update, including four zero-day vulnerabilities. Two zero-day vulnerabilities are actively exploited [1,2,3]. Additionally, five critical vulnerabilities leading to Remote Code Execution have been patched.</p><p>It is recommended updating as soon as possible. </p><h2 id=\"technical-details\">Technical Details</h2><h3 id=\"zero-day-vulnerabilities\">Zero-day Vulnerabilities</h3><p>The zero-day vulnerability <strong>CVE-2024-38080</strong>, with a CVSS score of 7.8, allow attackers to gain <code>SYSTEM</code> privileges on the host machine, but initial local access is required to exploit the flaw, according to Microsoft [4]. This vulnerability is being exploited.</p><p>The zero-day vulnerability <strong>CVE-2024-38112</strong>, with a CVSS score of 7.5, is a spoofing vulnerability in Windows MSHTML Platform that can be triggered with a specially crafted HTML file [5]. Exploitation of this vulnerability likely requires the use of an \u201cattack chain\u201d of exploits or programmatic changes on the target host. This vulnerability is being exploited.</p><p>The zero-day vulnerability <strong>CVE-2024-35264</strong>, with a CVSS score of 8.1, is a RCE vulnerability affecting .NET and Visual Studio. According to the advisory, the attack complexity is high because some conditions are beyond the attacker's control [6].</p><p>The zero-day vulnerability <strong>CVE-2024-37985</strong>, with a CVSS score of 5.9, affects ARM systems. By exploiting this vulnerability, an attacker would be able to view heap memory from a privileged process running on the server [7]. According to the advisory, the attack complexity is high because some conditions are beyond the attacker's control.</p><h3 id=\"other-critical-vulnerabilities\">Other Critical Vulnerabilities</h3><p>The vulnerabilities <strong>CVE-2024-38076</strong>, <strong>CVE-2024-38077</strong>, and <strong>CVE-2024-38074</strong>, with a CVSS score of 9.8, affect the Windows Remote Desktop Licensing Service component that manages client access licenses (CALs) for remote desktop services, and could lead to remote code execution if exploited [8,9,10].</p><p>The vulnerability <strong>CVE-2024-38060</strong>, with a CVSS score of 8.8, is a Windows Imaging Component Remote Code Execution Vulnerability. [11]</p><p>The vulnerability <strong>CVE-2024-38023</strong>, with a CVSS score of 7.2, is a Microsoft SharePoint Server Remote Code Execution Vulnerability. [12]</p><p><strong>[New]</strong> The vulnerability <strong>CVE-2024-38021</strong>, with a CVSS scode of 8.8, is a Remote Code Execution flow in Microsoft Outlook. It is not considered critical by Microsoft because it requires a one click user interaction for untrusted senders (while it does not require any user interaction for trusted sender). Attackers could exploit this vulnerability to gain unauthorised access, execute arbitrary code, and cause substantial damage without any user interaction. The absence of authentication requirements makes it particularly dangerous, as it opens the door to widespread exploitation. [13]</p><h2 id=\"affected-products\">Affected Products</h2><p>Affected products include, but are not limited to, Microsoft Windows, Microsoft Server, Microsoft Office and Microsoft Sharepoint, .NET and Visual Studio, Windows Remote Desktop Licensing Service.</p><p>Detailed information about each vulnerability and affected systems can be found in Microsoft's security bulletins [1]. </p><h2 id=\"recommendations\">Recommendations</h2><p>It is recommended applying updates to all affected assets as soon as possible, prioritising Internet facing devices, and devices affected by zero-day and critical vulnerabilities.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/releaseNote/2024-Jul\">https://msrc.microsoft.com/update-guide/releaseNote/2024-Jul</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days/\">https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days/</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://krebsonsecurity.com/2024/07/microsoft-patch-tuesday-july-2024-edition/\">https://krebsonsecurity.com/2024/07/microsoft-patch-tuesday-july-2024-edition/</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38080</a></p><p>[5] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112\">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38112</a></p><p>[6] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-35264\">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-35264</a></p><p>[7] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-37985\">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-37985</a></p><p>[8] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38076\">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38076</a></p><p>[9] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38077\">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38077</a></p><p>[10] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38074\">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38074</a></p><p>[11] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38060\">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38060</a></p><p>[12] <a rel=\"noopener\" target=\"_blank\" href=\"https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38023\">https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-38023</a></p><p>[13] <a rel=\"noopener\" target=\"_blank\" href=\"https://blog.morphisec.com/cve-2024-38021-microsoft-outlook-moniker-rce-vulnerability\">https://blog.morphisec.com/cve-2024-38021-microsoft-outlook-moniker-rce-vulnerability</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}