{"id":25197,"date":"2024-09-12T11:22:55","date_gmt":"2024-09-12T19:22:55","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2024\/09\/12\/news-18927\/"},"modified":"2024-09-12T11:22:55","modified_gmt":"2024-09-12T19:22:55","slug":"news-18927","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/09\/12\/news-18927\/","title":{"rendered":"September Patch Tuesday addresses 79 CVEs"},"content":{"rendered":"<p><strong>Credit to Author: Angela Gunn| Date: Thu, 12 Sep 2024 08:10:26 +0000<\/strong><\/p>\n<div class=\"entry-content lg:prose-lg mx-auto prose max-w-4xl\">\n<p>Microsoft on Tuesday released 79 patches touching eleven product families. Seven of those issues, affecting Azure, SharePoint, and Windows, are considered by Microsoft to be of critical severity. At press time, three of the issues addressed are known to be under exploit in the wild, with a fourth issue not itself under exploit, but intertwined with issues that are. (For details on this unusual situation, please see the \u201cNotable September updates\u201d section below.) Microsoft assesses that 11 CVEs, all in Windows, are by the company\u2019s estimation more likely to be exploited in the next 30 days. Eight of this month\u2019s issues are amenable to detection by Sophos protections, and we include information on those in a table below.<\/p>\n<p>In addition to these patches, the release includes advisory information on three CVEs addressed by patches from Adobe, affecting Reader and ColdFusion; one of the Reader vulnerabilities CVE-2024-41869) is a critical-severity use-after-free with a workable exploit already available in the wild. We are as always including at the end of this post additional appendices listing all Microsoft\u2019s patches, sorted by severity, by predicted exploitability, and by product family.<\/p>\n<p><strong>By the numbers<\/strong><\/p>\n<ul>\n<li>Total CVEs: 79<\/li>\n<li>Total Adobe advisories covered in update: 3<\/li>\n<li>Publicly disclosed: 1<\/li>\n<li>Exploited detected: 4*<\/li>\n<li>Severity\n<ul>\n<li>Critical: 7<\/li>\n<li>Important: 71<\/li>\n<li>Moderate: 1<\/li>\n<\/ul>\n<\/li>\n<li>Impact\n<ul>\n<li>Elevation of privilege: 30<\/li>\n<li>Remote code execution: 23<\/li>\n<li>Information disclosure: 11<\/li>\n<li>Denial of service: 8<\/li>\n<li>Security feature bypass: 4<\/li>\n<li>Spoofing: 3<\/li>\n<\/ul>\n<\/li>\n<li>CVSS base score 9.0 or greater: 2<\/li>\n<li>CVSS base score 8.0 or greater: 24<\/li>\n<\/ul>\n<p>* For information on why we count CVE-2024-43491 as this month\u2019s fourth exploited-detected CVE despite the CVE itself not being detected as under exploit, please see the \u201cNotable September updates\u201d section below.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-01.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957312\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-01.png\" alt=\"A bar chart displaying the severity of vulnerabilities addressed in Microsoft's September 2024 patch release. Information is duplicated in the article text.\" width=\"640\" height=\"414\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-01.png 842w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-01.png?resize=300,194 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-01.png?resize=768,497 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 1: This month\u2019s critical-severity patches include one for which exploitation has already been detected, and two more for which exploitation is more likely within the next 30 days<\/em><\/p>\n<p><strong>Product families<\/strong><\/p>\n<ul>\n<li>Windows: 47<\/li>\n<li>SQL Server: 13<\/li>\n<li>Azure: 6<\/li>\n<li>SharePoint: 5<\/li>\n<li>Office: 4<\/li>\n<li>365: 2<\/li>\n<li>Dynamics 365: 2<\/li>\n<li>Microsoft AutoUpdate (MAU) for Mac: 1<\/li>\n<li>Outlook for iOS: 1<\/li>\n<li>Power BI: 1<\/li>\n<li>Visio: 1<\/li>\n<\/ul>\n<p>As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-02.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957313\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-02.png\" alt=\"A bar chart displaying the product families affected by vulnerabilities addressed in Microsoft's September 2024 patch release. Information is duplicated in the article text.\" width=\"640\" height=\"443\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-02.png 849w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-02.png?resize=300,208 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-02.png?resize=768,532 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 2: Though Windows as usual leads the list of affected product families, a collection of Native Scoring issues in SQL Server contributed to that product taking 13 patches of its own<\/em><\/p>\n<p><strong>Notable September updates<\/strong><\/p>\n<p>In addition to the issues discussed above, a number of specific items merit attention.<\/p>\n<p><strong>CVE-2024-38217 &#8212; Windows Mark of the Web Security Feature Bypass Vulnerability<br \/> CVE-2024-43492 &#8212; Windows Mark of the Web Security Feature Bypass Vulnerability<\/strong><\/p>\n<p>There are patches for two Mark of the Web vulnerabilities this month, and both are either currently under active exploit in the wild (CVE-2024-38217) or judged by Microsoft as more likely to be exploited within the next 30 days (CVE-2024-43492). The latter bug was found in-house at Microsoft and is considered to be of moderate severity. The former, however, was disclosed responsibly by Elastic Security\u2019s Joe Desimone, who has <a href=\"https:\/\/www.elastic.co\/security-labs\/dismantling-smart-app-control\">posted<\/a> about the discovery and the reporting process, and which may be of interest to those who follow issues around code-signing certificates. The bug affects all versions of Windows including Win 11H24 and is of important severity.<\/p>\n<p><strong>CVE-2024-38014 &#8212; Windows Installer Elevation of Privilege Vulnerability<\/strong><\/p>\n<p>This <a href=\"https:\/\/cloud.google.com\/blog\/topics\/threat-intelligence\/privileges-third-party-windows-installers\/\">issue<\/a> is under active exploit in the wild. It affects all versions of Windows including Win 11H24.<\/p>\n<p><strong>CVE-2024-43491 &#8211; Microsoft Windows Update Remote Code Execution Vulnerability<\/strong><\/p>\n<p>The good news is that this issue affects only certain operational components of Windows 10, version 1507 (first released in July 2015); only two versions of that build, Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB, are still under support. The bad news, for those still running either of those versions, is that critical-severity remote code execution issue, which carries a 9.8 CVE base score, occurs in\u2026 the Windows Servicing Stack. It\u2019s a fascinating issue for those who care about such things &#8212; rather than a coding error per se, Microsoft explains that <em>the build version numbers themselves<\/em> \u201ccrossed into a range that triggered a code defect in the Windows 10 (version 1507) servicing stack that handles the applicability of Optional Components. As a result, any Optional Component that was serviced with updates released since March 12, 2024 (KB5035858) was detected as &#8220;not applicable&#8221; by the servicing stack and was reverted to its RTM version.\u201d If this issue is applicable to your estate, it is recommended that you closely read and follow the information Microsoft provides in <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/september-10-2024-kb5043083-os-build-10240-20766-5a6c8182-b565-4b11-b127-97893b866ba1\">KB5043083<\/a>, as the patch sequence one must follow is precise. That page also includes a list of the specific optional components affected, which may help clarify your exposure.<\/p>\n<p><strong>[29 CVEs] &#8212; Windows 11 24H2 patches<\/strong><\/p>\n<p>Even though Windows 11 24H2 is not yet in general release, just over a third of this month\u2019s patches affect that platform, including two (CVE-2024-38014, CVE-2024-38217) for which exploitation has already been detected in the wild. Users of the new Copilot+ PCs who do not ingest their patches automatically should be sure to update their devices.<\/p>\n<p><strong>[0 CVEs] &#8212; .NET, Visual Studio, Edge \/ Chromium, non-iOS Outlook<\/strong><\/p>\n<p>A rare month of respite for .NET and Visual Studio, with no patches released for those families. Nor are there any this time around related to Edge, or to Outlook for platforms other than Apple\u2019s.<\/p>\n<p><a href=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-03.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-957314\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-03.png\" alt=\"A bar chart displaying the severity of vulnerabilities addressed in Microsoft's 2024 patch releases so far.\" width=\"640\" height=\"411\" srcset=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-03.png 837w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-03.png?resize=300,193 300w, https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/2409pt-figure-03.png?resize=768,494 768w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/a><\/p>\n<p><em>Figure 3: Despite the predominance of EoP issues in recent months, RCE continues to lead the pack as we reach the three-quarter mark for 2024. <\/em><\/p>\n<p><strong>Sophos protections<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>As you can every month, if you don\u2019t want to wait for your system to pull down Microsoft\u2019s updates itself, you can download them manually from the Windows Update Catalog website. Run the <strong>winver.exe <\/strong>tool to determine which build of Windows 10 or 11 you\u2019re running, then download the Cumulative Update package for your specific system\u2019s architecture and build number.<\/p>\n<p><strong>Appendix A: Vulnerability Impact and Severity<\/strong><\/p>\n<p>This is a list of September patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.<\/p>\n<p><strong>Elevation of Privilege (30 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38194<\/td>\n<td width=\"472\">Azure Web Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38216<\/td>\n<td width=\"472\">Azure Stack Hub Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38220<\/td>\n<td width=\"472\">Azure Stack Hub Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37341<\/td>\n<td width=\"472\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37965<\/td>\n<td width=\"472\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37980<\/td>\n<td width=\"472\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38014<\/td>\n<td width=\"472\">Windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38046<\/td>\n<td width=\"472\">PowerShell Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38188<\/td>\n<td width=\"472\">Azure Network Watcher VM Agent Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38225<\/td>\n<td width=\"472\">Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38237<\/td>\n<td width=\"472\">Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38238<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38239<\/td>\n<td width=\"472\">Windows Kerberos Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38240<\/td>\n<td width=\"472\">Windows Remote Access Connection Manager Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38241<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38242<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38243<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38244<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38245<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38246<\/td>\n<td width=\"472\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38247<\/td>\n<td width=\"472\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38248<\/td>\n<td width=\"472\">Windows Storage Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38249<\/td>\n<td width=\"472\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38250<\/td>\n<td width=\"472\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38252<\/td>\n<td width=\"472\">Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38253<\/td>\n<td width=\"472\">Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43457<\/td>\n<td width=\"472\">Windows Setup and Deployment Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43465<\/td>\n<td width=\"472\">Microsoft Excel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43470<\/td>\n<td width=\"472\">Azure Network Watcher VM Agent Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43492<\/td>\n<td width=\"472\">Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Remote Code Execution (23 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"614\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-38018<\/td>\n<td width=\"472\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-38119<\/td>\n<td width=\"472\">Windows Network Address Translation (NAT) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-43464<\/td>\n<td width=\"472\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-43491<\/td>\n<td width=\"472\">Microsoft Windows Update Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"614\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-21416<\/td>\n<td width=\"472\">Windows TCP\/IP Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-26186<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-26191<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-37335<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-37338<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-37339<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-37340<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-38045<\/td>\n<td width=\"472\">Windows TCP\/IP Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-38227<\/td>\n<td width=\"472\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-38228<\/td>\n<td width=\"472\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-38259<\/td>\n<td width=\"472\">Microsoft Management Console Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-38260<\/td>\n<td width=\"472\">Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-38263<\/td>\n<td width=\"472\">Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-43454<\/td>\n<td width=\"472\">Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-43463<\/td>\n<td width=\"472\">Microsoft Office Visio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-43467<\/td>\n<td width=\"472\">Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-43469<\/td>\n<td width=\"472\">Azure CycleCloud Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-43479<\/td>\n<td width=\"472\">Microsoft Power Automate Desktop Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"142\">CVE-2024-43495<\/td>\n<td width=\"472\">Windows libarchive Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><strong>\u00a0<\/strong><\/p>\n<p><strong>Information Disclosure (11 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37337<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37342<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37966<\/td>\n<td width=\"472\">Microsoft SQL Server Native Scoring Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38254<\/td>\n<td width=\"472\">Windows Authentication Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38256<\/td>\n<td width=\"472\">Windows Kernel-Mode Driver Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38257<\/td>\n<td width=\"472\">Microsoft AllJoyn API Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38258<\/td>\n<td width=\"472\">Windows Remote Desktop Licensing Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43458<\/td>\n<td width=\"472\">Windows Networking Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43474<\/td>\n<td width=\"472\">Microsoft SQL Server Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43475<\/td>\n<td width=\"472\">Microsoft Windows Admin Center Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43482<\/td>\n<td width=\"472\">Microsoft Outlook for iOS Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Denial of Service (8 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38230<\/td>\n<td width=\"472\">Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38231<\/td>\n<td width=\"472\">Windows Remote Desktop Licensing Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38232<\/td>\n<td width=\"472\">Windows Networking Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38233<\/td>\n<td width=\"472\">Windows Networking Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38234<\/td>\n<td width=\"472\">Windows Networking Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38235<\/td>\n<td width=\"472\">Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38236<\/td>\n<td width=\"472\">DHCP Server Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43466<\/td>\n<td width=\"472\">Microsoft SharePoint Server Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Security Feature Bypass (4 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-30073<\/td>\n<td width=\"472\">Windows Security Zone Mapping Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38217<\/td>\n<td width=\"472\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38226<\/td>\n<td width=\"472\">Microsoft Publisher Security Features Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Moderate severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43487<\/td>\n<td width=\"472\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Spoofing (3 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43455<\/td>\n<td width=\"472\">Windows Remote Desktop Licensing Service Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43461<\/td>\n<td width=\"472\">Windows MSHTML Platform Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43476<\/td>\n<td width=\"472\">Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Appendix B: Exploitability<\/strong><\/p>\n<p>This is a list of the September CVEs judged by Microsoft to be either under exploitation in the wild or more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE. In the case of CVE-2024-43491, the issue itself is not known to be under active exploit, but certain of the issues fixed by the rejected servicing-stack updates are, so we are choosing to include it on this list. (Please see the \u201cNotable September updates\u201d section above for context.)<\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Exploitation detected<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38014<\/td>\n<td width=\"472\">Windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38217<\/td>\n<td width=\"472\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38226<\/td>\n<td width=\"472\">Microsoft Publisher Security Features Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43491<\/td>\n<td width=\"472\">Microsoft Windows Update Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"604\"><strong>Exploitation more likely within the next 30 days<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38018<\/td>\n<td width=\"472\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38227<\/td>\n<td width=\"472\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38228<\/td>\n<td width=\"472\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38237<\/td>\n<td width=\"472\">Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38238<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38241<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38242<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38243<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38244<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38245<\/td>\n<td width=\"472\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38246<\/td>\n<td width=\"472\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38247<\/td>\n<td width=\"472\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38249<\/td>\n<td width=\"472\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38252<\/td>\n<td width=\"472\">Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38253<\/td>\n<td width=\"472\">Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43457<\/td>\n<td width=\"472\">Windows Setup and Deployment Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43461<\/td>\n<td width=\"472\">Windows MSHTML Platform Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43464<\/td>\n<td width=\"472\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43487<\/td>\n<td width=\"472\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Appendix C: Products Affected<\/strong><\/p>\n<p>This is a list of September\u2019s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family.<\/p>\n<p><strong>Windows (47 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38119<\/td>\n<td width=\"469\">Windows Network Address Translation (NAT) Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43491<\/td>\n<td width=\"469\">Microsoft Windows Update Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-21416<\/td>\n<td width=\"469\">Windows TCP\/IP Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-30073<\/td>\n<td width=\"469\">Windows Security Zone Mapping Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38014<\/td>\n<td width=\"469\">Windows Installer Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38045<\/td>\n<td width=\"469\">Windows TCP\/IP Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38046<\/td>\n<td width=\"469\">PowerShell Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38217<\/td>\n<td width=\"469\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38230<\/td>\n<td width=\"469\">Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38231<\/td>\n<td width=\"469\">Windows Remote Desktop Licensing Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38232<\/td>\n<td width=\"469\">Windows Networking Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38233<\/td>\n<td width=\"469\">Windows Networking Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38234<\/td>\n<td width=\"469\">Windows Networking Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38235<\/td>\n<td width=\"469\">Windows Hyper-V Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38236<\/td>\n<td width=\"469\">DHCP Server Service Denial of Service Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38237<\/td>\n<td width=\"469\">Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38238<\/td>\n<td width=\"469\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38239<\/td>\n<td width=\"469\">Windows Kerberos Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38240<\/td>\n<td width=\"469\">Windows Remote Access Connection Manager Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38241<\/td>\n<td width=\"469\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38242<\/td>\n<td width=\"469\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38243<\/td>\n<td width=\"469\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38244<\/td>\n<td width=\"469\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38245<\/td>\n<td width=\"469\">Kernel Streaming Service Driver Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38246<\/td>\n<td width=\"469\">Win32k Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38247<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38248<\/td>\n<td width=\"469\">Windows Storage Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38249<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38252<\/td>\n<td width=\"469\">Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38253<\/td>\n<td width=\"469\">Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38254<\/td>\n<td width=\"469\">Windows Authentication Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38256<\/td>\n<td width=\"469\">Windows Kernel-Mode Driver Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38257<\/td>\n<td width=\"469\">Microsoft AllJoyn API Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38258<\/td>\n<td width=\"469\">Windows Remote Desktop Licensing Service Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38259<\/td>\n<td width=\"469\">Microsoft Management Console Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38260<\/td>\n<td width=\"469\">Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38263<\/td>\n<td width=\"469\">Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43454<\/td>\n<td width=\"469\">Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43455<\/td>\n<td width=\"469\">Windows Remote Desktop Licensing Service Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43457<\/td>\n<td width=\"469\">Windows Setup and Deployment Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43458<\/td>\n<td width=\"469\">Windows Networking Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43461<\/td>\n<td width=\"469\">Windows MSHTML Platform Spoofing Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43467<\/td>\n<td width=\"469\">Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43475<\/td>\n<td width=\"469\">Microsoft Windows Admin Center Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43495<\/td>\n<td width=\"469\">Windows libarchive Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Moderate severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43487<\/td>\n<td width=\"469\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>SQL Server (13 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-26186<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-26191<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37335<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37337<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37338<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37339<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37340<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37341<\/td>\n<td width=\"469\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37342<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37965<\/td>\n<td width=\"469\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37966<\/td>\n<td width=\"469\">Microsoft SQL Server Native Scoring Information Disclosure Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-37980<\/td>\n<td width=\"469\">Microsoft SQL Server Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43474<\/td>\n<td width=\"469\">Microsoft SQL Server Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Azure (6 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38194<\/td>\n<td width=\"469\">Azure Web Apps Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38216<\/td>\n<td width=\"469\">Azure Stack Hub Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38220<\/td>\n<td width=\"469\">Azure Stack Hub Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38188<\/td>\n<td width=\"469\">Azure Network Watcher VM Agent Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43469<\/td>\n<td width=\"469\">Azure CycleCloud Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43470<\/td>\n<td width=\"469\">Azure Network Watcher VM Agent Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>SharePoint (5 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Critical severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38018<\/td>\n<td width=\"469\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43464<\/td>\n<td width=\"469\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38227<\/td>\n<td width=\"469\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38228<\/td>\n<td width=\"469\">Microsoft SharePoint Server Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43466<\/td>\n<td width=\"469\">Microsoft SharePoint Server Denial of Service Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Office (4 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38226<\/td>\n<td width=\"469\">Microsoft Publisher Security Features Bypass Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38250<\/td>\n<td width=\"469\">Windows Graphics Component Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43463<\/td>\n<td width=\"469\">Microsoft Office Visio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43465<\/td>\n<td width=\"469\">Microsoft Excel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>365 (2 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43463<\/td>\n<td width=\"469\">Microsoft Office Visio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43465<\/td>\n<td width=\"469\">Microsoft Excel Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Dynamics 365 (2 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-38225<\/td>\n<td width=\"469\">Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43476<\/td>\n<td width=\"469\">Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Microsoft AutoUpdate (MAU) for Mac (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43492<\/td>\n<td width=\"469\">Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Outlook for iOS (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43482<\/td>\n<td width=\"469\">Microsoft Outlook for iOS Information Disclosure Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>PowerBI (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43479<\/td>\n<td width=\"469\">Microsoft Power Automate Desktop Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Visio (1 CVE)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td colspan=\"2\" width=\"601\"><strong>Important severity<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"132\">CVE-2024-43463<\/td>\n<td width=\"469\">Microsoft Office Visio Remote Code Execution Vulnerability<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Appendix D: Advisories and Other Products<\/strong><\/p>\n<p>This is a list of advisories and information on other relevant CVEs in the September release, sorted by product.<\/p>\n<p><strong>Relevant to Adobe (non-Microsoft release) (3 CVEs)<\/strong><\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"123\">CVE-2024-41869<\/td>\n<td width=\"85\">APSB24-70<\/td>\n<td width=\"397\">Use After Free (CWE-416)<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2024-41874<\/td>\n<td width=\"85\">APSB24-71<\/td>\n<td width=\"397\">Deserialization of Untrusted Data (CWE-502)<\/td>\n<\/tr>\n<tr>\n<td width=\"123\">CVE-2024-39420<\/td>\n<td width=\"85\">APSB24-70<\/td>\n<td width=\"397\">Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<\/p><\/div>\n<p><a href=\"https:\/\/news.sophos.com\/en-us\/2024\/09\/12\/september-patch-tuesday-addresses-79-cves\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/news.sophos.com\/wp-content\/uploads\/2024\/09\/shutterstock_1521141509.jpg\"\/><\/p>\n<p><strong>Credit to Author: Angela Gunn| Date: Thu, 12 Sep 2024 08:10:26 +0000<\/strong><\/p>\n<p>Seven critical-severity vulnerabilities addressed, including an extraordinary (but narrow) Windows Update flaw<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10405,10516,3495,19245,16771],"class_list":["post-25197","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-intercept-x","tag-microsoft","tag-microsoft-windows","tag-patch-tuesday","tag-threat-research"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=25197"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/25197\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=25197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=25197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=25197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}