Microsoft’s August 2024 Patch Tuesday release was, in one sense, a respite from July’s 138-CVE torrent of fixes, with just 85 CVEs addressed in the main release. However, with over two dozen advisories, a number of “informational” notices concerning material released in June and July, two high-profile issues for which the fixes are still a work in progress, and over 85 Linux-related CVEs covered in the release, administrators may find their patch prioritization especially complex this month.
At patch time, five of the issues addressed are known to be under exploit in the wild. Three more are publicly disclosed. Microsoft assesses that 11 CVEs, all in Windows, are by the company’s estimation more likely to be exploited in the next 30 days. Nine of this month’s issues are amenable to detection by Sophos protections, and we include information on those in a table below.
In addition to these patches, the release includes advisory information on 12 patches from Adobe, nine for Edge via Chrome (in addition to three Edge patches from Microsoft), and the regularly released servicing stack update (ADV990001). The company also provided information on five CVEs addressed earlier this summer but not announced in their respective months (one in June, four in July). We will list those in Appendix D below; those who have already applied the patches for those months are already protected and need not apply them again. (It should be noted that one issue patched in June, CVE-2024-38213, is under active attack in the wild – a good argument for applying patches as soon as possible after release.) Microsoft also took pains this month to flag three other CVEs for which fixes have already gone out, but that are included in Patch Tuesday information for transparency’s sake; we list those in Appendix D as well. We are as always including at the end of this post additional appendices listing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product family.
Finally, this month’s release includes a large cohort of CVEs related to CBL-Mariner, or in some cases to both Mariner and Azure Linux. (Mariner was renamed Azure Linux earlier this year, but the information provided by Microsoft on these CVEs differentiates between the two.) The CVEs come from a timespan from 2007 to 2024; the CVSS base scores range from 3.2 to a “perfect” 10.  Those CVEs are not included in the data in the main part of this post, but we have listed all 84 CVEs in Appendix E at the end of this article for reference. Two additional Mariner / Azure Linux CVEs also touch Windows, and those two are included in the statistics in the main article as well as in Appendix E’s list.
The data in the main part of this post reflects only the 85 CVEs in the non-Mariner, non-advisory portion of the release.
By the numbers

Total CVEs: 85
Total Edge / Chrome advisory issues covered in update: 9 (plus 3 non-advisory Edge issues)
Total non-Edge Microsoft advisory issues covered in update: 9
Total Adobe issues covered in update: 12
Publicly disclosed: 3
Exploited: 5
Severity

Critical: 6
Important: 77
Moderate: 2

Impact

Elevation of Privilege: 32
Remote Code Execution: 31
Information Disclosure: 8
Denial of Service: 6
Spoofing: 6
Security Feature Bypass: 2

Figure 1: The six critical-severity vulnerabilities addressed in August’s Patch Tuesday release include the second this year involving security feature bypass. (This chart does not represent the Mariner-related issues discussed elsewhere in this article)
Products

Windows: 62
Azure: 7
365 Apps for Enterprise: 7
Office: 7
Edge: 3 (plus 9 advisories via Chrome)
.NET: 2
Azure Linux: 2
CBL-Mariner: 2
Visual Studio: 2
App Installer: 1
Dynamics 365: 1
OfficePlus: 1
Outlook: 1
PowerPoint: 1
Project: 1
Teams: 1

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect.

Figure 2: A wide variety of product families are affected by August’s patches; at least one, App Installer, is so obscure that Microsoft has included a link to information on it in the release itself, including information on updating it via winget. Still, Windows as ever rules the roost
Notable August updates
In addition to the issues discussed above, a number of specific items merit attention.
CVE-2024-21302 – Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-38202 – Windows Update Stack Elevation of Privilege Vulnerability
These two Important-severity issued were debuted by researcher Alon Leviev last week at Black Hat last week after a prolonged responsible-disclosure process. Microsoft has been working on the solution for six months, but it needs a little more time to untangle this complex issue with Virtualization-Based Security (VBS). For now, Microsoft is publishing mitigation information for both CVE-2024-21302 and CVE-2024-38202 on their site.
CVE-2024-38063 – Windows TCP/IP Remote Code Execution Vulnerability
There are three CVEs in this release with a 9.8 CVSS base score, but only this one has the distinction of also being, in Microsoft’s estimation, more likely to be exploited in the next thirty days. That’s unfortunate, because this critical-severity RCE bug requires neither privileges nor user interaction. An attacker could exploit this issue by repeatedly sending IPv6 packets, with specially crafted IPv6 packets mixed in, to a Windows machine with IPv6 enabled. (Machines that have IPv6 disabled would not be affected by this attack.) Sophos has released protections (Exp/2438063-A) for this issue, as noted in the table below.
CVE-2024-38213 – Windows Mark of the Web Security Feature Bypass Vulnerability
This issue is one of the five noted above that was actually patched months ago (in this case, June 2024). Those who have applied the patches released in June are protected; those who have not applied the patches should do so, as the issue is currently under active attack.
[42 CVEs] Windows 11 24H2 patches, already
Even though Windows 11 24H2 is not yet in general release, just under half of the issues addressed this month apply to that operating system. Users of the new Copilot+ PCs who do not ingest their patches automatically should be sure to update their devices; those who do should have taken all the relevant patches with the latest cumulative update, which elevates those devices to Build 26100.1457.

Figure 3: With a total of 659 CVEs addressed in Patch Tuesday releases so far in 2024, Microsoft’s dealing with a far heavier volume than they were at this point in 2023 (491 patches), but a bit less than they handled in 2022 (690 patches). That said, this table does not include the 84 Mariner-released CVEs discussed elsewhere in this post
Sophos protections

CVE
Sophos Intercept X/Endpoint IPS
Sophos XGS Firewall

CVE-2024-38063
Exp/2438063-A

CVE-2024-38106
Exp/2438106-A

CVE-2024-38141
Exp/2438141-A

CVE-2024-38144
Exp/2438144-A

CVE-2024-38147
Exp/2438147-A

CVE-2024-38150
Exp/2438150-A

CVE-2024-38178

2309977

CVE-2024-38193
Exp/2438193-A

CVE-2024-38196
Exp/2438196-A

 
As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows 10 or 11 you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.
Appendix A: Vulnerability Impact and Severity
This is a list of August patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.
Elevation of Privilege (32 CVEs)

Important severity

CVE-2024-21302
Windows Secure Kernel Mode Elevation of Privilege Vulnerability

CVE-2024-29995
Windows Kerberos Elevation of Privilege Vulnerability

CVE-2024-38084
Microsoft OfficePlus Elevation of Privilege Vulnerability

CVE-2024-38098
Azure Connected Machine Agent Elevation of Privilege Vulnerability

CVE-2024-38106
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38107
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability

CVE-2024-38117
Windows Named Pipe Filesystem Elevation of Privilege Vulnerability

CVE-2024-38125
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

CVE-2024-38127
Windows Hyper-V Elevation of Privilege Vulnerability

CVE-2024-38133
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38134
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

CVE-2024-38135
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

CVE-2024-38136
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability

CVE-2024-38137
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability

CVE-2024-38141
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVE-2024-38142
Windows Secure Kernel Mode Elevation of Privilege Vulnerability

CVE-2024-38143
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability

CVE-2024-38144
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

CVE-2024-38147
Microsoft DWM Core Library Elevation of Privilege Vulnerability

CVE-2024-38150
Windows DWM Core Library Elevation of Privilege Vulnerability

CVE-2024-38153
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38162
Azure Connected Machine Agent Elevation of Privilege Vulnerability

CVE-2024-38163
Windows Update Stack Elevation of Privilege Vulnerability

CVE-2024-38184
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

CVE-2024-38191
Kernel Streaming Service Driver Elevation of Privilege Vulnerability

CVE-2024-38193
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVE-2024-38196
Windows Common Log File System Driver Elevation of Privilege Vulnerability

CVE-2024-38198
Windows Print Spooler Elevation of Privilege Vulnerability

CVE-2024-38201
Azure Stack Hub Elevation of Privilege Vulnerability

CVE-2024-38202
Windows Update Stack Elevation of Privilege Vulnerability

CVE-2024-38215
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

CVE-2024-38223
Windows Initial Machine Configuration Elevation of Privilege Vulnerability

 
Remote Code Execution (31 CVEs)

Critical severity

CVE-2022-3775
Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequences

CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability

CVE-2024-38140
Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability

CVE-2024-38159
Windows Network Virtualization Remote Code Execution Vulnerability

CVE-2024-38160
Windows Network Virtualization Remote Code Execution Vulnerability

Important severity

CVE-2024-38114
Windows IP Routing Management Snapin Remote Code Execution Vulnerability

CVE-2024-38115
Windows IP Routing Management Snapin Remote Code Execution Vulnerability

CVE-2024-38116
Windows IP Routing Management Snapin Remote Code Execution Vulnerability

CVE-2024-38120
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38121
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38128
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38130
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38131
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability

CVE-2024-38138
Windows Deployment Services Remote Code Execution Vulnerability

CVE-2024-38152
Windows OLE Remote Code Execution Vulnerability

CVE-2024-38154
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38157
Azure IoT SDK Remote Code Execution Vulnerability

CVE-2024-38158
Azure IoT SDK Remote Code Execution Vulnerability

CVE-2024-38161
Windows Mobile Broadband Driver Remote Code Execution Vulnerability

CVE-2024-38169
Microsoft Office Visio Remote Code Execution Vulnerability

CVE-2024-38170
Microsoft Excel Remote Code Execution Vulnerability

CVE-2024-38171
Microsoft PowerPoint Remote Code Execution Vulnerability

CVE-2024-38172
Microsoft Excel Remote Code Execution Vulnerability

CVE-2024-38173
Microsoft Outlook Remote Code Execution Vulnerability

CVE-2024-38178
Scripting Engine Memory Corruption Vulnerability

CVE-2024-38180
SmartScreen Prompt Remote Code Execution Vulnerability

CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability

CVE-2024-38195
Azure CycleCloud Remote Code Execution Vulnerability

CVE-2024-38199
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability

CVE-2024-38218
Microsoft Edge (HTML-based) Memory Corruption Vulnerability

Moderate severity

CVE-2024-38219
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

 
Information Disclosure (8 CVEs)

Important severity

CVE-2024-38118
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

CVE-2024-38122
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

CVE-2024-38123
Windows Bluetooth Driver Information Disclosure Vulnerability

CVE-2024-38151
Windows Kernel Information Disclosure Vulnerability

CVE-2024-38155
Security Center Broker Information Disclosure Vulnerability

CVE-2024-38167
.NET and Visual Studio Information Disclosure Vulnerability

CVE-2024-38214
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

Moderate severity

CVE-2024-38222
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability

 
Denial of Service (6 CVEs)

Important severity

CVE-2024-38126
Windows Network Address Translation (NAT) Denial of Service Vulnerability

CVE-2024-38132
Windows Network Address Translation (NAT) Denial of Service Vulnerability

CVE-2024-38145
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

CVE-2024-38146
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

CVE-2024-38148
Windows Secure Channel Denial of Service Vulnerability

CVE-2024-38168
.NET and Visual Studio Denial of Service Vulnerability

 
Spoofing (6 CVEs)

Important severity

CVE-2024-37968
Windows DNS Spoofing Vulnerability

CVE-2024-38108
Azure Stack Spoofing Vulnerability

CVE-2024-38177
Windows App Installer Spoofing Vulnerability

CVE-2024-38197
Microsoft Teams for iOS Spoofing Vulnerability

CVE-2024-38200
Microsoft Office Spoofing Vulnerability

CVE-2024-38211
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 
Security Feature Bypass (2 CVEs)

Critical severity

CVE-2023-40547
Redhat: CVE-2023-40547 Shim – RCE in HTTP boot support may lead to secure boot bypass

Important severity

CVE-2022-2601
Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

 
Appendix B: Exploitability
This is a list of the August CVEs judged by Microsoft to be either under exploitation in the wild or more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE. This table does not include CVE-2024-38213, which was released in June.

Exploitation detected

CVE-2024-38106
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38107
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability

CVE-2024-38178
Scripting Engine Memory Corruption Vulnerability

CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability

CVE-2024-38193
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Exploitation more likely within the next 30 days

CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability

CVE-2024-38125
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

CVE-2024-38133
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38141
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVE-2024-38144
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

CVE-2024-38147
Microsoft DWM Core Library Elevation of Privilege Vulnerability

CVE-2024-38148
Windows Secure Channel Denial of Service Vulnerability

CVE-2024-38150
Windows DWM Core Library Elevation of Privilege Vulnerability

CVE-2024-38163
Windows Update Stack Elevation of Privilege Vulnerability

CVE-2024-38196
Windows Common Log File System Driver Elevation of Privilege Vulnerability

CVE-2024-38198
Windows Print Spooler Elevation of Privilege Vulnerability

 
Appendix C: Products Affected
This is a list of August’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family.
Windows (62 CVEs)

Critical severity

CVE-2022-3775
Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequences

CVE-2023-40547
Redhat: CVE-2023-40547 Shim – RCE in HTTP boot support may lead to secure boot bypass

CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability

CVE-2024-38140
Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability

CVE-2024-38159
Windows Network Virtualization Remote Code Execution Vulnerability

CVE-2024-38160
Windows Network Virtualization Remote Code Execution Vulnerability

Important severity

CVE-2022-2601
Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

CVE-2024-21302
Windows Secure Kernel Mode Elevation of Privilege Vulnerability

CVE-2024-29995
Windows Kerberos Elevation of Privilege Vulnerability

CVE-2024-37968
Windows DNS Spoofing Vulnerability

CVE-2024-38106
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38107
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability

CVE-2024-38114
Windows IP Routing Management Snapin Remote Code Execution Vulnerability

CVE-2024-38115
Windows IP Routing Management Snapin Remote Code Execution Vulnerability

CVE-2024-38116
Windows IP Routing Management Snapin Remote Code Execution Vulnerability

CVE-2024-38117
Windows Named Pipe Filesystem Elevation of Privilege Vulnerability

CVE-2024-38118
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

CVE-2024-38120
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38121
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38122
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

CVE-2024-38123
Windows Bluetooth Driver Information Disclosure Vulnerability

CVE-2024-38125
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

CVE-2024-38126
Windows Network Address Translation (NAT) Denial of Service Vulnerability

CVE-2024-38127
Windows Hyper-V Elevation of Privilege Vulnerability

CVE-2024-38128
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38130
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38131
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability

CVE-2024-38132
Windows Network Address Translation (NAT) Denial of Service Vulnerability

CVE-2024-38133
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38134
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

CVE-2024-38135
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability

CVE-2024-38136
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability

CVE-2024-38137
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability

CVE-2024-38138
Windows Deployment Services Remote Code Execution Vulnerability

CVE-2024-38141
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVE-2024-38142
Windows Secure Kernel Mode Elevation of Privilege Vulnerability

CVE-2024-38143
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability

CVE-2024-38144
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

CVE-2024-38145
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

CVE-2024-38146
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

CVE-2024-38147
Microsoft DWM Core Library Elevation of Privilege Vulnerability

CVE-2024-38148
Windows Secure Channel Denial of Service Vulnerability

CVE-2024-38150
Windows DWM Core Library Elevation of Privilege Vulnerability

CVE-2024-38151
Windows Kernel Information Disclosure Vulnerability

CVE-2024-38152
Windows OLE Remote Code Execution Vulnerability

CVE-2024-38153
Windows Kernel Elevation of Privilege Vulnerability

CVE-2024-38154
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

CVE-2024-38155
Security Center Broker Information Disclosure Vulnerability

CVE-2024-38161
Windows Mobile Broadband Driver Remote Code Execution Vulnerability

CVE-2024-38163
Windows Update Stack Elevation of Privilege Vulnerability

CVE-2024-38178
Scripting Engine Memory Corruption Vulnerability

CVE-2024-38180
SmartScreen Prompt Remote Code Execution Vulnerability

CVE-2024-38184
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

CVE-2024-38191
Kernel Streaming Service Driver Elevation of Privilege Vulnerability

CVE-2024-38193
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

CVE-2024-38196
Windows Common Log File System Driver Elevation of Privilege Vulnerability

CVE-2024-38198
Windows Print Spooler Elevation of Privilege Vulnerability

CVE-2024-38199
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability

CVE-2024-38202
Windows Update Stack Elevation of Privilege Vulnerability

CVE-2024-38214
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability

CVE-2024-38215
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

CVE-2024-38223
Windows Initial Machine Configuration Elevation of Privilege Vulnerability

 
Azure (7 CVEs)

Important severity

CVE-2024-38098
Azure Connected Machine Agent Elevation of Privilege Vulnerability

CVE-2024-38108
Azure Stack Spoofing Vulnerability

CVE-2024-38157
Azure IoT SDK Remote Code Execution Vulnerability

CVE-2024-38158
Azure IoT SDK Remote Code Execution Vulnerability

CVE-2024-38162
Azure Connected Machine Agent Elevation of Privilege Vulnerability

CVE-2024-38195
Azure CycleCloud Remote Code Execution Vulnerability

CVE-2024-38201
Azure Stack Hub Elevation of Privilege Vulnerability

 
365 Apps for Enterprise (7 CVEs)

Important severity

CVE-2024-38169
Microsoft Office Visio Remote Code Execution Vulnerability

CVE-2024-38170
Microsoft Excel Remote Code Execution Vulnerability

CVE-2024-38171
Microsoft PowerPoint Remote Code Execution Vulnerability

CVE-2024-38172
Microsoft Excel Remote Code Execution Vulnerability

CVE-2024-38173
Microsoft Outlook Remote Code Execution Vulnerability

CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability

CVE-2024-38200
Microsoft Office Spoofing Vulnerability

 
Office (7 CVEs)

Important severity

CVE-2024-38169
Microsoft Office Visio Remote Code Execution Vulnerability

CVE-2024-38170
Microsoft Excel Remote Code Execution Vulnerability

CVE-2024-38171
Microsoft PowerPoint Remote Code Execution Vulnerability

CVE-2024-38172
Microsoft Excel Remote Code Execution Vulnerability

CVE-2024-38173
Microsoft Outlook Remote Code Execution Vulnerability

CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability

CVE-2024-38200
Microsoft Office Spoofing Vulnerability

 
Edge (3 CVE)

Important severity

CVE-2024-38218
Microsoft Edge (HTML-based) Memory Corruption Vulnerability

Moderate severity

CVE-2024-38219
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

CVE-2024-38222
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability

 
.NET (2 CVE)

Important severity

CVE-2024-38167
.NET and Visual Studio Information Disclosure Vulnerability

CVE-2024-38168
.NET and Visual Studio Denial of Service Vulnerability

 
Azure Linux (2 CVE)

Critical severity

CVE-2022-3775
Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequences

Important severity

CVE-2022-2601
Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

 
CBL-Mariner (2 CVE)

Critical severity

CVE-2022-3775
Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequences

Important severity

CVE-2022-2601
Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

 
Visual Studio (2 CVE)

Important severity

CVE-2024-38167
.NET and Visual Studio Information Disclosure Vulnerability

CVE-2024-38168
.NET and Visual Studio Denial of Service Vulnerability

 
App Installer (1 CVE)

Important severity

CVE-2024-38177
Windows App Installer Spoofing Vulnerability

 
Dynamics 365 (1 CVE)

Important severity

CVE-2024-38211
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 
OfficePlus (1 CVE)

Important severity

CVE-2024-38084
Microsoft OfficePlus Elevation of Privilege Vulnerability

 
Outlook (1 CVE)

Important severity

CVE-2024-38173
Microsoft Outlook Remote Code Execution Vulnerability

 
PowerPoint (1 CVE)

Important severity

CVE-2024-38171
Microsoft PowerPoint Remote Code Execution Vulnerability

 
Project (1 CVE)

Important severity

CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability

 
Teams (1 CVE)

Important severity

CVE-2024-38197
Microsoft Teams for iOS Spoofing Vulnerability

 
Appendix D: Advisories and Other Products
This is a list of advisories and information on other relevant CVEs in the August Microsoft release, sorted by product.
Relevant to Edge / Chromium (9 CVEs)

CVE-2024-6990
Chromium: CVE-2024-6990 Uninitialized Use in Dawn

CVE-2024-7255
Chromium: CVE-2024-7255 Out of bounds read in WebTransport

CVE-2024-7256
Chromium: CVE-2024-7256 Insufficient data validation in Dawn

CVE-2024-7532
Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE

CVE-2024-7533
Chromium: CVE-2024-7533 Use after free in Sharing

CVE-2024-7534
Chromium: CVE-2024-7534 Heap buffer overflow in Layout

CVE-2024-7535
Chromium: CVE-2024-7535 Inappropriate implementation in V8

CVE-2024-7536
Chromium: CVE-2024-7536 Use after free in WebAudio

CVE-2024-7550
Chromium: CVE-2024-7550 Type Confusion in V8

 
Servicing Stack Updates (1 item)

ADV990001
Latest Servicing Stack Updates

 
Previously Released; Information Missing from Previous Patch Tuesday Data (5 CVEs)

Released June 2024

CVE-2024-38213
Windows Mark of the Web Security Feature Bypass Vulnerability

Released July 2024

CVE-2024-38165
Windows Compressed Folder Tampering Vulnerability

CVE-2024-38185
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

CVE-2024-38186
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

CVE-2024-38187
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

 
Previously Released (Cloud); Information Provided as Advisory Only (3 items)

CVE-2024-38109
Azure Health Bot Elevation of Privilege Vulnerability

CVE-2024-38166
Microsoft Dynamics 365 Cross-site Scripting Vulnerability

CVE-2024-38206
Microsoft Copilot Studio Information Disclosure Vulnerability

 
Relevant to Adobe (non-Microsoft release) (12 CVEs)

APSB24-57
CVE-2024-39383
Use After Free (CWE-416)

APSB24-57
CVE-2024-39422
Use After Free (CWE-416)

APSB24-57
CVE-2024-39423
Out-of-bounds Write (CWE-787)

APSB24-57
CVE-2024-39424
Use After Free (CWE-416)

APSB24-57
CVE-2024-39425
Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)

APSB24-57
CVE-2024-39426
Access of Memory Location After End of Buffer (CWE-788)

APSB24-57
CVE-2024-41830
Use After Free (CWE-416)

APSB24-57
CVE-2024-41831
Use After Free (CWE-416)

APSB24-57
CVE-2024-41832
Out-of-bounds Read (CWE-125)

APSB24-57
CVE-2024-41833
Out-of-bounds Read (CWE-125)

APSB24-57
CVE-2024-41834
Out-of-bounds Read (CWE-125)

APSB24-57
CVE-2024-41835
Out-of-bounds Read (CWE-125)

 
Appendix E: CVEs Relevant to CBL-Mariner / Azure Linux
The information on these CVEs, which originated with an assortment of CNAs, is often rather different in nature from that provided for CVEs addressed in Microsoft’s Patch Tuesday process. Often such CVEs have no title, or no available CVSS scoring. For this table, we have chosen to simply list the CVEs as noted in Microsoft’s own summary information.

CVE-2007-4559
CVE-2022-36648
CVE-2024-37370
CVE-2024-40898

CVE-2017-17522
CVE-2022-3775
CVE-2024-37371
CVE-2024-40902

CVE-2017-18207
CVE-2022-3872
CVE-2024-38428
CVE-2024-41110

CVE-2019-20907
CVE-2022-4144
CVE-2024-38571
CVE-2024-42068

CVE-2019-3816
CVE-2022-41722
CVE-2024-38583
CVE-2024-42070

CVE-2019-3833
CVE-2022-48788
CVE-2024-38662
CVE-2024-42071

CVE-2019-9674
CVE-2022-48841
CVE-2024-38780
CVE-2024-42072

CVE-2021-23336
CVE-2023-29402
CVE-2024-39277
CVE-2024-42073

CVE-2021-3750
CVE-2023-29404
CVE-2024-39292
CVE-2024-42074

CVE-2021-3929
CVE-2023-3354
CVE-2024-39331
CVE-2024-42075

CVE-2021-4158
CVE-2023-45288
CVE-2024-39473
CVE-2024-42076

CVE-2021-4206
CVE-2023-52340
CVE-2024-39474
CVE-2024-42077

CVE-2021-4207
CVE-2024-0397
CVE-2024-39475
CVE-2024-42078

CVE-2021-43565
CVE-2024-0853
CVE-2024-39476
CVE-2024-42080

CVE-2022-0358
CVE-2024-2004
CVE-2024-39480
CVE-2024-42082

CVE-2022-2601
CVE-2024-23722
CVE-2024-39482
CVE-2024-42083

CVE-2022-26353
CVE-2024-2398
CVE-2024-39483
CVE-2024-42237

CVE-2022-26354
CVE-2024-2466
CVE-2024-39484
CVE-2024-6104

CVE-2022-29526
CVE-2024-26461
CVE-2024-39485
CVE-2024-6257

CVE-2022-2962
CVE-2024-26900
CVE-2024-39489
CVE-2024-6655

CVE-2022-3165
CVE-2024-36288
CVE-2024-39493

CVE-2022-35414
CVE-2024-37298
CVE-2024-39495