Microsoft’s April 2024 Patch Tuesday Addresses 147 CVEs (CVE-2024-29988)
2024-4-10 02:6:20 Author: www.tenable.com(查看原文) 阅读量:113 收藏

Tenable Security Response Team

A blue background with the words "Tenable Research" positioned at the top center of the image. Underneath it is a rectangular shaped box with the bottom left and top right corners being rounded. The word "MICROSOFT" is inside the rectangle in bold lettering with "PATCH TUESDAY" underneath. The April 2024 Patch Tuesday release addresses 147 CVEs including three critical flaws.

  1. 3Critical
  2. 142Important
  3. 2Moderate
  4. 0Low

Microsoft addresses 147 CVEs in its April 2024 Patch Tuesday release with three critical vulnerabilities and no zero-day or publicly disclosed vulnerabilities.

Microsoft patched 147 CVEs in its April 2024 Patch Tuesday release, with three rated critical, 142 rated as important, and two rated as moderate.

A pie chart showing the severity distribution across the Patch Tuesday CVEs patched in April 2024.

This month’s update includes patches for:

  • .NET and Visual Studio
  • Azure
  • Azure AI Search
  • Azure Arc
  • Azure Compute Gallery
  • Azure Migrate
  • Azure Monitor
  • Azure Private 5G Core
  • Azure SDK
  • Intel
  • Internet Shortcut Files
  • Microsoft Azure Kubernetes Service
  • Microsoft Brokering File System
  • Microsoft Defender for IoT
  • Microsoft Edge (Chromium-based)
  • Microsoft Install Service
  • Microsoft Office Excel
  • Microsoft Office Outlook
  • Microsoft Office SharePoint
  • Microsoft WDAC ODBC Driver
  • Microsoft WDAC OLE DB provider for SQL
  • Role: DNS Server
  • Role: Windows Hyper-V
  • SQL Server
  • Windows Authentication Methods
  • Windows BitLocker
  • Windows Compressed Folder
  • Windows Cryptographic Services
  • Windows DHCP Server
  • Windows DWM Core Library
  • Windows Defender Credential Guard
  • Windows Distributed File System (DFS)
  • Windows File Server Resource Management Service
  • Windows HTTP.sys
  • Windows Internet Connection Sharing (ICS)
  • Windows Kerberos
  • Windows Kernel
  • Windows Local Security Authority Subsystem Service (LSASS)
  • Windows Message Queuing
  • Windows Mobile Hotspot
  • Windows Proxy Driver
  • Windows Remote Access Connection Manager
  • Windows Remote Procedure Call
  • Windows Routing and Remote Access Service (RRAS)
  • Windows Secure Boot
  • Windows Storage
  • Windows Telephony Server
  • Windows USB Print Driver
  • Windows Update Stack
  • Windows Virtual Machine Bus
  • Windows Win32K - ICOMP

A bar chart showing the count by impact of CVEs patched in the April 2024 Patch Tuesday release.

Remote code execution (RCE) vulnerabilities accounted for 45.6% of the vulnerabilities patched this month, followed by elevation of privilege (EoP) vulnerabilities at 21.1%.

CVE-2024-29988 | SmartScreen Prompt Security Feature Bypass Vulnerability

CVE-2024-29988 is a security feature bypass vulnerability in Microsoft Defender SmartScreen. It was assigned a CVSSv3 score of 8.8 and is rated as important. An attacker could exploit this vulnerability by convincing a target to open a specially crafted file using social engineering tactics such as an external link or malicious attachment sent over email, instant messages or social media.This flaw was reported to Microsoft by some of the same researchers that disclosed CVE-2024-21412, an Internet Shortcut Files security feature bypass that was associated with a DarkGate campaign using fake installer files impersonating Apple iTunes, Notion, NVIDIA and others.

CVE-2024-29990 | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability

CVE-2024-29990 is an EoP vulnerability in the Azure Kubernetes Service Confidential Containers (AKSCC). It was assigned a CVSSv3 score of 9 and is rated important. Exploitation of this flaw hinges on the preparation of a target environment by an attacker. Successful exploitation would enable an attacker to “steal credentials and affect resources beyond the security scope managed by AKSCC.” This includes taking over both “confidential guests and containers beyond the network stack it might be bound to.”

This is the third month in a row that a flaw in AKSCC was patched as part of Patch Tuesday:

CVEDescriptionCVSSv3Patch Tuesday
CVE-2024-21400Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability9March 2024
CVE-2024-21376Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerability9February 2024
CVE-2024-21403Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability9February 2024

All four of these vulnerabilities were reported to Microsoft by Yuval Avrahami of Palo Alto Networks.

41 CVEs | Microsoft ODBC Driver, WDAC OLE DB Driver and OLE DB Driver for SQL Server Remote Code Execution Vulnerability

This month's release included 41 CVEs affecting multiple drivers for SQL Server, the Open Database Connectivity (ODBC) driver, WDAC OLE DB Driver and OLE DB driver. All but one of these CVEs received CVSSv3 scores of 8.8, with the lone exception, CVE-2024-29045 receiving a 7.5. All were rated as “Exploitation Less Likely” according to the Microsoft Exploitability Index, with none being publicly disclosed or exploited in the wild. A full list of the CVEs is included in the table below.

CVEDescriptionCVSSv3
CVE-2024-28929Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28930Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28931Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28932Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28933Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28934Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28935Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28936Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28937Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28938Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28941Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28943Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29043Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28906Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28908Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28909Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28910Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28911Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28912Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28913Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28914Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28915Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28926Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28927Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28939Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28940Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28942Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28944Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-28945Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29044Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29045Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability7.5
CVE-2024-29047Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29048Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29982Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29983Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29984Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29985Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-26210Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-26214Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability8.8
CVE-2024-26244Microsoft WDAC OLE DB Provider for SQL Server Remote Code Execution Vulnerability8.8
CVE-2024-29046Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability8.8

24 CVEs | Secure Boot Security Feature Bypass Vulnerability

Microsoft patched 24 CVEs in Windows Secure Boot in as part of the April 2024 Patch Tuesday release. All are rated as “Exploitation Less Likely” and vary in CVSSv3 scores from 4.1 to 8.0.

Four of the 24 CVEs were assigned a CVSSv3 score of 8.0. They include CVE-2024-26240, CVE-2024-26189, CVE-2024-28925 and CVE-2024-26180. Exploitation of all of these flaws do require an attacker to have either physical access or local administrator privileges on the vulnerable device.

These 24 CVEs are the first bundle of Secure Boot vulnerabilities we’ve seen since May 2023, when Microsoft patched CVE-2023-24932, another security feature bypass flaw in Secure Boot that was exploited in the wild as part of the BlackLotus UEFI bootkit.

Tenable Solutions

A list of all the plugins released for Tenable’s April 2024 Patch Tuesday update can be found here. As always, we recommend patching systems as soon as possible and regularly scanning your environment to identify those systems yet to be patched.

For more specific guidance on best practices for vulnerability assessments, please refer to our blog post on How to Perform Efficient Vulnerability Assessments with Tenable.

Get more information

Join Tenable's Security Response Team on the Tenable Community.

Learn more about Tenable One, the Exposure Management Platform for the modern attack surface.

Tenable Security Response Team

Tenable Security Response Team

The Tenable Security Response Team (SRT) tracks threat and vulnerability intelligence feeds to ensure our research teams can deliver sensor coverage to our products as quickly as possible. The SRT also works to analyze and assess technical details and writes white papers, blogs and additional communications to ensure stakeholders are fully informed of the latest risks and threats. The SRT provides breakdowns for the latest vulnerabilities on the Tenable blog.

Related Articles

  • Exposure Management

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Thank You

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Thank You

Thank you for your interest in Tenable.io. A representative will be in touch soon.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Thank You

Thank you for your interest in Tenable Vulnerability Management. A representative will be in touch soon.

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Thank You

Thank you for your interest in Tenable Lumin. A representative will be in touch soon.

Request a demo of Tenable Security Center

Please fill out this form with your contact information.

A sales representative will contact you shortly to schedule a demo.

* Field is required

Request a demo of Tenable OT Security

Get the Operational Technology Security You Need.

Reduce the Risk You Don’t.

Request a demo of Tenable Identity Exposure

Continuously detect and respond to Active Directory attacks. No agents. No privileges.

On-prem and in the cloud.

Request a Demo of Tenable Cloud Security

Exceptional unified cloud security awaits you!

We’ll show you exactly how Tenable Cloud Security helps you deliver multi-cloud asset discovery, prioritized risk assessments and automated compliance/audit reports.

See
Tenable One
In Action

Exposure management for the modern attack surface.

See Tenable Attack Surface Management In Action

Know the exposure of every asset on any platform.

Thank You

Thank you for your interest in Tenable Attack Surface Management. A representative will be in touch soon.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Learn How Tenable Helps Achieve SLCGP Cybersecurity Plan Requirements

Tenable solutions help fulfill all SLCGP requirements. Connect with a Tenable representative to learn more.


文章来源: https://www.tenable.com/blog/microsofts-april-2024-patch-tuesday-addresses-147-cves-cve-2024-29988
如有侵权请联系:admin#unsafe.sh