Microsoft Monthly Security Update (April 2024)

Microsoft has released monthly security update for their products:

 

Vulnerable ProductRisk LevelImpactsNotes
BrowserLow Risk Low RiskSpoofing 
WindowsHigh Risk High RiskSecurity Restriction Bypass
Remote Code Execution
Denial of Service
Information Disclosure
Elevation of Privilege
Spoofing

CVE-2024-26234  is being exploited in the wild. The vulnerability allows a malicious driver signed using a valid Microsoft Hardware Publisher Certificate.

 

CVE-2024-29988  is being exploited in the wild. The attacker could send the targeted user a specially crafted file that tricks users into executing malicious files to exploit the remote code execution vulnerability.

Extended Security Updates (ESU)Medium Risk Medium RiskSecurity Restriction Bypass
Remote Code Execution
Elevation of Privilege
Information Disclosure
Denial of Service
Spoofing
 
Developer ToolsMedium Risk Medium RiskRemote Code Execution 
AzureMedium Risk Medium RiskElevation of Privilege
Information Disclosure
Denial of Service
Remote Code Execution
 
SQL ServerMedium Risk Medium RiskRemote Code Execution 
System CenterMedium Risk Medium RiskRemote Code Execution
Elevation of Privilege
 
Microsoft OfficeMedium Risk Medium RiskSpoofing
Remote Code Execution
 

 

Number of ‘Extremely High Risk’ product(s): 0

Number of ‘High Risk’ product(s): 1

Number of ‘Medium Risk’ product(s): 6

Number of ‘Low Risk’ product(s): 1

Evaluation of overall ‘Risk Level’: High Risk

 

[Updated on 2024-05-02] 

Updated Notes of Windows, CVE-2024-29988 is being exploited in the wild. The attacker could send the targeted user a specially crafted file that trick users into executing malicious files to exploit the remote code execution vulnerability.

RISK: High Risk

TYPE: Operating Systems – Windows OS

TYPE: Windows OS

Impact

  • Denial of Service
  • Elevation of Privilege
  • Remote Code Execution
  • Security Restriction Bypass
  • Information Disclosure
  • Spoofing

System / Technologies affected

  • Browser
  • Windows
  • Extended Security Updates (ESU)
  • Developer Tools
  • Azure
  • SQL Server
  • System Center
  • Microsoft Office

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  •  Apply fixes issued by the vendor.

Vulnerability Identifier

 

Source


Related Link

 

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.