Microsoft’s August 2024 Patch Tuesday release was, in one sense, a respite from July’s 138-CVE torrent of fixes, with just 85 CVEs addressed in the main release. However, with over two dozen advisories, a number of “informational” notices concerning material released in June and July, two high-profile issues for which the fixes are still a work in progress, and over 85 Linux-related CVEs covered in the release, administrators may find their patch prioritization especially complex this month.
At patch time, five of the issues addressed are known to be under exploit in the wild. Three more are publicly disclosed. Microsoft assesses that 11 CVEs, all in Windows, are by the company’s estimation more likely to be exploited in the next 30 days. Nine of this month’s issues are amenable to detection by Sophos protections, and we include information on those in a table below.
In addition to these patches, the release includes advisory information on 12 patches from Adobe, nine for Edge via Chrome (in addition to three Edge patches from Microsoft), and the regularly released servicing stack update (ADV990001). The company also provided information on five CVEs addressed earlier this summer but not announced in their respective months (one in June, four in July). We will list those in Appendix D below; those who have already applied the patches for those months are already protected and need not apply them again. (It should be noted that one issue patched in June, CVE-2024-38213, is under active attack in the wild – a good argument for applying patches as soon as possible after release.) Microsoft also took pains this month to flag three other CVEs for which fixes have already gone out, but that are included in Patch Tuesday information for transparency’s sake; we list those in Appendix D as well. We are as always including at the end of this post additional appendices listing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product family.
Finally, this month’s release includes a large cohort of CVEs related to CBL-Mariner, or in some cases to both Mariner and Azure Linux. (Mariner was renamed Azure Linux earlier this year, but the information provided by Microsoft on these CVEs differentiates between the two.) The CVEs come from a timespan from 2007 to 2024; the CVSS base scores range from 3.2 to a “perfect” 10. Those CVEs are not included in the data in the main part of this post, but we have listed all 84 CVEs in Appendix E at the end of this article for reference. Two additional Mariner / Azure Linux CVEs also touch Windows, and those two are included in the statistics in the main article as well as in Appendix E’s list.
The data in the main part of this post reflects only the 85 CVEs in the non-Mariner, non-advisory portion of the release.
By the numbers
Total CVEs: 85
Total Edge / Chrome advisory issues covered in update: 9 (plus 3 non-advisory Edge issues)
Total non-Edge Microsoft advisory issues covered in update: 9
Total Adobe issues covered in update: 12
Publicly disclosed: 3
Exploited: 5
Severity
Critical: 6
Important: 77
Moderate: 2
Impact
Elevation of Privilege: 32
Remote Code Execution: 31
Information Disclosure: 8
Denial of Service: 6
Spoofing: 6
Security Feature Bypass: 2
Figure 1: The six critical-severity vulnerabilities addressed in August’s Patch Tuesday release include the second this year involving security feature bypass. (This chart does not represent the Mariner-related issues discussed elsewhere in this article)
Products
Windows: 62
Azure: 7
365 Apps for Enterprise: 7
Office: 7
Edge: 3 (plus 9 advisories via Chrome)
.NET: 2
Azure Linux: 2
CBL-Mariner: 2
Visual Studio: 2
App Installer: 1
Dynamics 365: 1
OfficePlus: 1
Outlook: 1
PowerPoint: 1
Project: 1
Teams: 1
As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect.
Figure 2: A wide variety of product families are affected by August’s patches; at least one, App Installer, is so obscure that Microsoft has included a link to information on it in the release itself, including information on updating it via winget. Still, Windows as ever rules the roost
Notable August updates
In addition to the issues discussed above, a number of specific items merit attention.
CVE-2024-21302 – Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-38202 – Windows Update Stack Elevation of Privilege Vulnerability
These two Important-severity issued were debuted by researcher Alon Leviev last week at Black Hat last week after a prolonged responsible-disclosure process. Microsoft has been working on the solution for six months, but it needs a little more time to untangle this complex issue with Virtualization-Based Security (VBS). For now, Microsoft is publishing mitigation information for both CVE-2024-21302 and CVE-2024-38202 on their site.
CVE-2024-38063 – Windows TCP/IP Remote Code Execution Vulnerability
There are three CVEs in this release with a 9.8 CVSS base score, but only this one has the distinction of also being, in Microsoft’s estimation, more likely to be exploited in the next thirty days. That’s unfortunate, because this critical-severity RCE bug requires neither privileges nor user interaction. An attacker could exploit this issue by repeatedly sending IPv6 packets, with specially crafted IPv6 packets mixed in, to a Windows machine with IPv6 enabled. (Machines that have IPv6 disabled would not be affected by this attack.) Sophos has released protections (Exp/2438063-A) for this issue, as noted in the table below.
CVE-2024-38213 – Windows Mark of the Web Security Feature Bypass Vulnerability
This issue is one of the five noted above that was actually patched months ago (in this case, June 2024). Those who have applied the patches released in June are protected; those who have not applied the patches should do so, as the issue is currently under active attack.
[42 CVEs] Windows 11 24H2 patches, already
Even though Windows 11 24H2 is not yet in general release, just under half of the issues addressed this month apply to that operating system. Users of the new Copilot+ PCs who do not ingest their patches automatically should be sure to update their devices; those who do should have taken all the relevant patches with the latest cumulative update, which elevates those devices to Build 26100.1457.
Figure 3: With a total of 659 CVEs addressed in Patch Tuesday releases so far in 2024, Microsoft’s dealing with a far heavier volume than they were at this point in 2023 (491 patches), but a bit less than they handled in 2022 (690 patches). That said, this table does not include the 84 Mariner-released CVEs discussed elsewhere in this post
Sophos protections
CVE
Sophos Intercept X/Endpoint IPS
Sophos XGS Firewall
CVE-2024-38063
Exp/2438063-A
CVE-2024-38106
Exp/2438106-A
CVE-2024-38141
Exp/2438141-A
CVE-2024-38144
Exp/2438144-A
CVE-2024-38147
Exp/2438147-A
CVE-2024-38150
Exp/2438150-A
CVE-2024-38178
2309977
CVE-2024-38193
Exp/2438193-A
CVE-2024-38196
Exp/2438196-A
As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows 10 or 11 you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.
Appendix A: Vulnerability Impact and Severity
This is a list of August patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.
Elevation of Privilege (32 CVEs)
Important severity
CVE-2024-21302
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-29995
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-38084
Microsoft OfficePlus Elevation of Privilege Vulnerability
CVE-2024-38098
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2024-38106
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38107
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
CVE-2024-38117
Windows Named Pipe Filesystem Elevation of Privilege Vulnerability
CVE-2024-38125
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38127
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2024-38133
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38134
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38135
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2024-38136
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVE-2024-38137
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVE-2024-38141
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2024-38142
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-38143
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
CVE-2024-38144
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38147
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2024-38150
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2024-38153
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38162
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2024-38163
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-38184
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-38191
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38193
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2024-38196
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-38198
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2024-38201
Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2024-38202
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-38215
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2024-38223
Windows Initial Machine Configuration Elevation of Privilege Vulnerability
Remote Code Execution (31 CVEs)
Critical severity
CVE-2022-3775
Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequences
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-38140
Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability
CVE-2024-38159
Windows Network Virtualization Remote Code Execution Vulnerability
CVE-2024-38160
Windows Network Virtualization Remote Code Execution Vulnerability
Important severity
CVE-2024-38114
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38115
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38116
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38120
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38121
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38128
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38130
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38131
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
CVE-2024-38138
Windows Deployment Services Remote Code Execution Vulnerability
CVE-2024-38152
Windows OLE Remote Code Execution Vulnerability
CVE-2024-38154
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38157
Azure IoT SDK Remote Code Execution Vulnerability
CVE-2024-38158
Azure IoT SDK Remote Code Execution Vulnerability
CVE-2024-38161
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-38169
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-38170
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-38171
Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2024-38172
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-38173
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-38178
Scripting Engine Memory Corruption Vulnerability
CVE-2024-38180
SmartScreen Prompt Remote Code Execution Vulnerability
CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability
CVE-2024-38195
Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-38199
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
CVE-2024-38218
Microsoft Edge (HTML-based) Memory Corruption Vulnerability
Moderate severity
CVE-2024-38219
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
Information Disclosure (8 CVEs)
Important severity
CVE-2024-38118
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVE-2024-38122
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVE-2024-38123
Windows Bluetooth Driver Information Disclosure Vulnerability
CVE-2024-38151
Windows Kernel Information Disclosure Vulnerability
CVE-2024-38155
Security Center Broker Information Disclosure Vulnerability
CVE-2024-38167
.NET and Visual Studio Information Disclosure Vulnerability
CVE-2024-38214
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
Moderate severity
CVE-2024-38222
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
Denial of Service (6 CVEs)
Important severity
CVE-2024-38126
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-38132
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-38145
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38146
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38148
Windows Secure Channel Denial of Service Vulnerability
CVE-2024-38168
.NET and Visual Studio Denial of Service Vulnerability
Spoofing (6 CVEs)
Important severity
CVE-2024-37968
Windows DNS Spoofing Vulnerability
CVE-2024-38108
Azure Stack Spoofing Vulnerability
CVE-2024-38177
Windows App Installer Spoofing Vulnerability
CVE-2024-38197
Microsoft Teams for iOS Spoofing Vulnerability
CVE-2024-38200
Microsoft Office Spoofing Vulnerability
CVE-2024-38211
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
Security Feature Bypass (2 CVEs)
Critical severity
CVE-2023-40547
Redhat: CVE-2023-40547 Shim – RCE in HTTP boot support may lead to secure boot bypass
Important severity
CVE-2022-2601
Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
Appendix B: Exploitability
This is a list of the August CVEs judged by Microsoft to be either under exploitation in the wild or more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE. This table does not include CVE-2024-38213, which was released in June.
Exploitation detected
CVE-2024-38106
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38107
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
CVE-2024-38178
Scripting Engine Memory Corruption Vulnerability
CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability
CVE-2024-38193
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Exploitation more likely within the next 30 days
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-38125
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38133
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38141
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2024-38144
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38147
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2024-38148
Windows Secure Channel Denial of Service Vulnerability
CVE-2024-38150
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2024-38163
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-38196
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-38198
Windows Print Spooler Elevation of Privilege Vulnerability
Appendix C: Products Affected
This is a list of August’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family.
Windows (62 CVEs)
Critical severity
CVE-2022-3775
Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequences
CVE-2023-40547
Redhat: CVE-2023-40547 Shim – RCE in HTTP boot support may lead to secure boot bypass
CVE-2024-38063
Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-38140
Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability
CVE-2024-38159
Windows Network Virtualization Remote Code Execution Vulnerability
CVE-2024-38160
Windows Network Virtualization Remote Code Execution Vulnerability
Important severity
CVE-2022-2601
Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
CVE-2024-21302
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-29995
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-37968
Windows DNS Spoofing Vulnerability
CVE-2024-38106
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38107
Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
CVE-2024-38114
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38115
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38116
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-38117
Windows Named Pipe Filesystem Elevation of Privilege Vulnerability
CVE-2024-38118
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVE-2024-38120
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38121
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38122
Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability
CVE-2024-38123
Windows Bluetooth Driver Information Disclosure Vulnerability
CVE-2024-38125
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38126
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-38127
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2024-38128
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38130
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38131
Clipboard Virtual Channel Extension Remote Code Execution Vulnerability
CVE-2024-38132
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-38133
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38134
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38135
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2024-38136
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVE-2024-38137
Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability
CVE-2024-38138
Windows Deployment Services Remote Code Execution Vulnerability
CVE-2024-38141
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2024-38142
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-38143
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
CVE-2024-38144
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38145
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38146
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38147
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2024-38148
Windows Secure Channel Denial of Service Vulnerability
CVE-2024-38150
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2024-38151
Windows Kernel Information Disclosure Vulnerability
CVE-2024-38152
Windows OLE Remote Code Execution Vulnerability
CVE-2024-38153
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-38154
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-38155
Security Center Broker Information Disclosure Vulnerability
CVE-2024-38161
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-38163
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-38178
Scripting Engine Memory Corruption Vulnerability
CVE-2024-38180
SmartScreen Prompt Remote Code Execution Vulnerability
CVE-2024-38184
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-38191
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38193
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2024-38196
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-38198
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2024-38199
Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability
CVE-2024-38202
Windows Update Stack Elevation of Privilege Vulnerability
CVE-2024-38214
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2024-38215
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2024-38223
Windows Initial Machine Configuration Elevation of Privilege Vulnerability
Azure (7 CVEs)
Important severity
CVE-2024-38098
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2024-38108
Azure Stack Spoofing Vulnerability
CVE-2024-38157
Azure IoT SDK Remote Code Execution Vulnerability
CVE-2024-38158
Azure IoT SDK Remote Code Execution Vulnerability
CVE-2024-38162
Azure Connected Machine Agent Elevation of Privilege Vulnerability
CVE-2024-38195
Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-38201
Azure Stack Hub Elevation of Privilege Vulnerability
365 Apps for Enterprise (7 CVEs)
Important severity
CVE-2024-38169
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-38170
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-38171
Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2024-38172
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-38173
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability
CVE-2024-38200
Microsoft Office Spoofing Vulnerability
Office (7 CVEs)
Important severity
CVE-2024-38169
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-38170
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-38171
Microsoft PowerPoint Remote Code Execution Vulnerability
CVE-2024-38172
Microsoft Excel Remote Code Execution Vulnerability
CVE-2024-38173
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability
CVE-2024-38200
Microsoft Office Spoofing Vulnerability
Edge (3 CVE)
Important severity
CVE-2024-38218
Microsoft Edge (HTML-based) Memory Corruption Vulnerability
Moderate severity
CVE-2024-38219
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVE-2024-38222
Microsoft Edge (Chromium-based) Information Disclosure Vulnerability
.NET (2 CVE)
Important severity
CVE-2024-38167
.NET and Visual Studio Information Disclosure Vulnerability
CVE-2024-38168
.NET and Visual Studio Denial of Service Vulnerability
Azure Linux (2 CVE)
Critical severity
CVE-2022-3775
Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequences
Important severity
CVE-2022-2601
Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
CBL-Mariner (2 CVE)
Critical severity
CVE-2022-3775
Redhat: CVE-2022-3775 grub2 – Heap based out-of-bounds write when rendering certain Unicode sequences
Important severity
CVE-2022-2601
Redhat: CVE-2022-2601 grub2 – Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
Visual Studio (2 CVE)
Important severity
CVE-2024-38167
.NET and Visual Studio Information Disclosure Vulnerability
CVE-2024-38168
.NET and Visual Studio Denial of Service Vulnerability
App Installer (1 CVE)
Important severity
CVE-2024-38177
Windows App Installer Spoofing Vulnerability
Dynamics 365 (1 CVE)
Important severity
CVE-2024-38211
Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability
OfficePlus (1 CVE)
Important severity
CVE-2024-38084
Microsoft OfficePlus Elevation of Privilege Vulnerability
Outlook (1 CVE)
Important severity
CVE-2024-38173
Microsoft Outlook Remote Code Execution Vulnerability
PowerPoint (1 CVE)
Important severity
CVE-2024-38171
Microsoft PowerPoint Remote Code Execution Vulnerability
Project (1 CVE)
Important severity
CVE-2024-38189
Microsoft Project Remote Code Execution Vulnerability
Teams (1 CVE)
Important severity
CVE-2024-38197
Microsoft Teams for iOS Spoofing Vulnerability
Appendix D: Advisories and Other Products
This is a list of advisories and information on other relevant CVEs in the August Microsoft release, sorted by product.
Relevant to Edge / Chromium (9 CVEs)
CVE-2024-6990
Chromium: CVE-2024-6990 Uninitialized Use in Dawn
CVE-2024-7255
Chromium: CVE-2024-7255 Out of bounds read in WebTransport
CVE-2024-7256
Chromium: CVE-2024-7256 Insufficient data validation in Dawn
CVE-2024-7532
Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE
CVE-2024-7533
Chromium: CVE-2024-7533 Use after free in Sharing
CVE-2024-7534
Chromium: CVE-2024-7534 Heap buffer overflow in Layout
CVE-2024-7535
Chromium: CVE-2024-7535 Inappropriate implementation in V8
CVE-2024-7536
Chromium: CVE-2024-7536 Use after free in WebAudio
CVE-2024-7550
Chromium: CVE-2024-7550 Type Confusion in V8
Servicing Stack Updates (1 item)
ADV990001
Latest Servicing Stack Updates
Previously Released; Information Missing from Previous Patch Tuesday Data (5 CVEs)
Released June 2024
CVE-2024-38213
Windows Mark of the Web Security Feature Bypass Vulnerability
Released July 2024
CVE-2024-38165
Windows Compressed Folder Tampering Vulnerability
CVE-2024-38185
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-38186
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-38187
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Previously Released (Cloud); Information Provided as Advisory Only (3 items)
CVE-2024-38109
Azure Health Bot Elevation of Privilege Vulnerability
CVE-2024-38166
Microsoft Dynamics 365 Cross-site Scripting Vulnerability
CVE-2024-38206
Microsoft Copilot Studio Information Disclosure Vulnerability
Relevant to Adobe (non-Microsoft release) (12 CVEs)
APSB24-57
CVE-2024-39383
Use After Free (CWE-416)
APSB24-57
CVE-2024-39422
Use After Free (CWE-416)
APSB24-57
CVE-2024-39423
Out-of-bounds Write (CWE-787)
APSB24-57
CVE-2024-39424
Use After Free (CWE-416)
APSB24-57
CVE-2024-39425
Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)
APSB24-57
CVE-2024-39426
Access of Memory Location After End of Buffer (CWE-788)
APSB24-57
CVE-2024-41830
Use After Free (CWE-416)
APSB24-57
CVE-2024-41831
Use After Free (CWE-416)
APSB24-57
CVE-2024-41832
Out-of-bounds Read (CWE-125)
APSB24-57
CVE-2024-41833
Out-of-bounds Read (CWE-125)
APSB24-57
CVE-2024-41834
Out-of-bounds Read (CWE-125)
APSB24-57
CVE-2024-41835
Out-of-bounds Read (CWE-125)
Appendix E: CVEs Relevant to CBL-Mariner / Azure Linux
The information on these CVEs, which originated with an assortment of CNAs, is often rather different in nature from that provided for CVEs addressed in Microsoft’s Patch Tuesday process. Often such CVEs have no title, or no available CVSS scoring. For this table, we have chosen to simply list the CVEs as noted in Microsoft’s own summary information.
CVE-2007-4559
CVE-2022-36648
CVE-2024-37370
CVE-2024-40898
CVE-2017-17522
CVE-2022-3775
CVE-2024-37371
CVE-2024-40902
CVE-2017-18207
CVE-2022-3872
CVE-2024-38428
CVE-2024-41110
CVE-2019-20907
CVE-2022-4144
CVE-2024-38571
CVE-2024-42068
CVE-2019-3816
CVE-2022-41722
CVE-2024-38583
CVE-2024-42070
CVE-2019-3833
CVE-2022-48788
CVE-2024-38662
CVE-2024-42071
CVE-2019-9674
CVE-2022-48841
CVE-2024-38780
CVE-2024-42072
CVE-2021-23336
CVE-2023-29402
CVE-2024-39277
CVE-2024-42073
CVE-2021-3750
CVE-2023-29404
CVE-2024-39292
CVE-2024-42074
CVE-2021-3929
CVE-2023-3354
CVE-2024-39331
CVE-2024-42075
CVE-2021-4158
CVE-2023-45288
CVE-2024-39473
CVE-2024-42076
CVE-2021-4206
CVE-2023-52340
CVE-2024-39474
CVE-2024-42077
CVE-2021-4207
CVE-2024-0397
CVE-2024-39475
CVE-2024-42078
CVE-2021-43565
CVE-2024-0853
CVE-2024-39476
CVE-2024-42080
CVE-2022-0358
CVE-2024-2004
CVE-2024-39480
CVE-2024-42082
CVE-2022-2601
CVE-2024-23722
CVE-2024-39482
CVE-2024-42083
CVE-2022-26353
CVE-2024-2398
CVE-2024-39483
CVE-2024-42237
CVE-2022-26354
CVE-2024-2466
CVE-2024-39484
CVE-2024-6104
CVE-2022-29526
CVE-2024-26461
CVE-2024-39485
CVE-2024-6257
CVE-2022-2962
CVE-2024-26900
CVE-2024-39489
CVE-2024-6655
CVE-2022-3165
CVE-2024-36288
CVE-2024-39493
CVE-2022-35414
CVE-2024-37298
CVE-2024-39495