Microsoft Monthly Security Update (April 2024)
Microsoft has released monthly security update for their products:
Vulnerable Product | Risk Level | Impacts | Notes |
Browser | Spoofing | ||
Windows | Security Restriction Bypass Remote Code Execution Denial of Service Information Disclosure Elevation of Privilege Spoofing | CVE-2024-26234 is being exploited in the wild. The vulnerability allows a malicious driver signed using a valid Microsoft Hardware Publisher Certificate.
CVE-2024-29988 is being exploited in the wild. The attacker could send the targeted user a specially crafted file that tricks users into executing malicious files to exploit the remote code execution vulnerability. | |
Extended Security Updates (ESU) | Security Restriction Bypass Remote Code Execution Elevation of Privilege Information Disclosure Denial of Service Spoofing | ||
Developer Tools | Remote Code Execution | ||
Azure | Elevation of Privilege Information Disclosure Denial of Service Remote Code Execution | ||
SQL Server | Remote Code Execution | ||
System Center | Remote Code Execution Elevation of Privilege | ||
Microsoft Office | Spoofing Remote Code Execution |
Number of ‘Extremely High Risk’ product(s): 0
Number of ‘High Risk’ product(s): 1
Number of ‘Medium Risk’ product(s): 6
Number of ‘Low Risk’ product(s): 1
Evaluation of overall ‘Risk Level’: High Risk
[Updated on 2024-05-02]
Updated Notes of Windows, CVE-2024-29988 is being exploited in the wild. The attacker could send the targeted user a specially crafted file that trick users into executing malicious files to exploit the remote code execution vulnerability.
RISK: High Risk
TYPE: Operating Systems – Windows OS
Impact
- Denial of Service
- Elevation of Privilege
- Remote Code Execution
- Security Restriction Bypass
- Information Disclosure
- Spoofing
System / Technologies affected
- Browser
- Windows
- Extended Security Updates (ESU)
- Developer Tools
- Azure
- SQL Server
- System Center
- Microsoft Office
Solutions
Before installation of the software, please visit the vendor web-site for more details.
- Apply fixes issued by the vendor.
Vulnerability Identifier
Source
Related Link
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.