Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-38044
Vulnerability from cvelistv5
Published
2024-07-09 17:03
Modified
2024-12-10 19:15
Severity ?
EPSS score ?
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044 | Patch, Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-38044", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-07-24T20:26:20.446381Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-24T20:26:27.429Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T04:04:24.515Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "DHCP Server Service Remote Code Execution Vulnerability", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.6054", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2019 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.17763.6054", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2022", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.20348.2582", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2022, 23H2 Edition (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.25398.1009", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.7159", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2016 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "10.0.14393.7159", "status": "affected", "version": "10.0.0", "versionType": "custom" } ] }, { "platforms": [ "32-bit Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22769", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22769", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.0.6003.22769", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.27219", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.1.7601.27219", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.24975", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.2.9200.24975", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.22074", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] }, { "platforms": [ "x64-based Systems" ], "product": "Windows Server 2012 R2 (Server Core installation)", "vendor": "Microsoft", "versions": [ { "lessThan": "6.3.9600.22074", "status": "affected", "version": "6.3.0", "versionType": "custom" } ] } ], "cpeApplicability": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.6054", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.17763.6054", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.20348.2582", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.25398.1009", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.7159", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "versionEndExcluding": "10.0.14393.7159", "versionStartIncluding": "10.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "6.0.6003.22769", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "6.0.6003.22769", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", "versionEndExcluding": "6.0.6003.22769", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "6.1.7601.27219", "versionStartIncluding": "6.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "6.1.7601.27219", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "versionEndExcluding": "6.2.9200.24975", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "versionEndExcluding": "6.2.9200.24975", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "6.3.9600.22074", "versionStartIncluding": "6.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", "versionEndExcluding": "6.3.9600.22074", "versionStartIncluding": "6.3.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "datePublic": "2024-07-09T07:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "DHCP Server Service Remote Code Execution Vulnerability" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-197", "description": "CWE-197: Numeric Truncation Error", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-10T19:15:32.205Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "DHCP Server Service Remote Code Execution Vulnerability", "tags": [ "vendor-advisory" ], "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044" } ], "title": "DHCP Server Service Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2024-38044", "datePublished": "2024-07-09T17:03:10.833Z", "dateReserved": "2024-06-11T22:08:32.504Z", "dateUpdated": "2024-12-10T19:15:32.205Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-38044\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2024-07-09T17:15:32.490\",\"lastModified\":\"2024-11-21T09:24:46.567\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"DHCP Server Service Remote Code Execution Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo del servicio de servidor DHCP\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-197\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-681\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DF96F8-BA6A-4780-9CA3-F719B3F81074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB18C4CE-5917-401E-ACF7-2747084FD36E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.14393.7159\",\"matchCriteriaId\":\"59C9A2A5-AE44-4583-A7B1-B8D62B0E83BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.17763.6054\",\"matchCriteriaId\":\"3401E6F7-2430-4247-8A22-0B733A03501A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.20348.2582\",\"matchCriteriaId\":\"4E433A09-F730-4EBE-8050-8789755B0D35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"10.0.25398.1009\",\"matchCriteriaId\":\"EDA01A4A-9AED-484A-8B10-3282FA13F635\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}" } }
NCSC-2024-0279
Vulnerability from csaf_ncscnl
Published
2024-07-09 18:40
Modified
2024-07-09 18:40
Summary
Kwetsbaarheden verholpen in Microsoft Windows
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Omzeilen van beveiligingsmaatregel
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- SQL Injection
- Toegang tot systeemgegevens
- Verhoogde gebruikersrechten
De ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten.
```
---
Windows Server Backup:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows PowerShell:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten |
| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Desktop:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38015 | 7.50 | Denial-of-Service |
| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Image Acquisition:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Internet Connection Sharing (ICS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38102 | 6.50 | Denial-of-Service |
| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38101 | 6.50 | Denial-of-Service |
| CVE-2024-38105 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Intel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Online Certificate Status Protocol (OCSP):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38031 | 7.50 | Denial-of-Service |
| CVE-2024-38067 | 7.50 | Denial-of-Service |
| CVE-2024-38068 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows COM Session:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Secure Boot:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Kernel-Mode Drivers:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Win32 Kernel Subsystem:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Windows Codecs Library:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Workstation Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows LockDown Policy (WLDP):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Microsoft Graphics Component:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows MultiPoint Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Line Printer Daemon Service (LPD):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38027 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
NDIS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38048 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows CoreMessaging:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Access Connection Manager:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens |
| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Cryptographic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Win32K - GRFX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Role: Windows Hyper-V:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
NPS RADIUS Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Microsoft Streaming Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Desktop Licensing Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38071 | 7.50 | Denial-of-Service |
| CVE-2024-38072 | 7.50 | Denial-of-Service |
| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code |
| CVE-2024-38073 | 7.50 | Denial-of-Service |
| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code |
| CVE-2024-38099 | 5.90 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows NTLM:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Microsoft WS-Discovery:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38091 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Distributed Transaction Coordinator:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Performance Monitor:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
XBox Crypto Graphic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code |
| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows iSCSI:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-35270 | 5.30 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Enroll Engine:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Fax and Scan Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows TCP/IP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows DHCP Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Themes:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows Message Queuing:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Win32K - ICOMP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Active Directory Rights Management Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows BitLocker:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Role: Active Directory Certificate Services; Active Directory Domain Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Filtering:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows MSHTML Platform:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
---
```
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
Dreigingsinformatie
Kans
medium
Schade
high
CWE-121
Stack-based Buffer Overflow
CWE-122
Heap-based Buffer Overflow
CWE-125
Out-of-bounds Read
CWE-126
Buffer Over-read
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-166
Improper Handling of Missing Special Element
CWE-190
Integer Overflow or Wraparound
CWE-191
Integer Underflow (Wrap or Wraparound)
CWE-197
Numeric Truncation Error
CWE-20
Improper Input Validation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-284
Improper Access Control
CWE-287
Improper Authentication
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-328
Use of Weak Hash
CWE-347
Improper Verification of Cryptographic Signature
CWE-400
Uncontrolled Resource Consumption
CWE-415
Double Free
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-668
Exposure of Resource to Wrong Sphere
CWE-674
Uncontrolled Recursion
CWE-693
Protection Mechanism Failure
CWE-73
External Control of File Name or Path
CWE-822
Untrusted Pointer Dereference
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-908
Use of Uninitialized Resource
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.\n\n", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- SQL Injection\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\n\nDe ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten. \n\n```\n\n---\nWindows Server Backup: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38015 | 7.50 | Denial-of-Service | \n| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Image Acquisition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Internet Connection Sharing (ICS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38102 | 6.50 | Denial-of-Service | \n| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38101 | 6.50 | Denial-of-Service | \n| CVE-2024-38105 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nIntel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38031 | 7.50 | Denial-of-Service | \n| CVE-2024-38067 | 7.50 | Denial-of-Service | \n| CVE-2024-38068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows COM Session: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32 Kernel Subsystem: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Workstation Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows LockDown Policy (WLDP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MultiPoint Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38027 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nNDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38048 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows CoreMessaging: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens | \n| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nNPS RADIUS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38071 | 7.50 | Denial-of-Service | \n| CVE-2024-38072 | 7.50 | Denial-of-Service | \n| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38073 | 7.50 | Denial-of-Service | \n| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38099 | 5.90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft WS-Discovery: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38091 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Performance Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nXBox Crypto Graphic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows iSCSI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-35270 | 5.30 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Enroll Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Fax and Scan Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Themes: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nActive Directory Rights Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Active Directory Certificate Services; Active Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Filtering: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\n\n---\n\n```", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "description", "text": " ", "title": "Dreigingsinformatie" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Improper Handling of Missing Special Element", "title": "CWE-166" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Numeric Truncation Error", "title": "CWE-197" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "title": "Kwetsbaarheden verholpen in Microsoft Windows", "tracking": { "current_release_date": "2024-07-09T18:40:21.043319Z", "id": "NCSC-2024-0279", "initial_release_date": "2024-07-09T18:40:21.043319Z", "revision_history": [ { "date": "2024-07-09T18:40:21.043319Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "rfc", "product": { "name": "rfc", "product_id": "CSAFPID-1497114", "product_identification_helper": { "cpe": "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "ietf" }, { "branches": [ { "category": "product_name", "name": "windows_10_version_1507", "product": { "name": "windows_10_version_1507", "product_id": "CSAFPID-1453769", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-21417", "references": [ { "category": "self", "summary": "CVE-2024-21417", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21417.json" } ], "title": "CVE-2024-21417" }, { "cve": "CVE-2024-28899", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28899", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28899.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-28899" }, { "cve": "CVE-2024-30081", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30081", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30081.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30081" }, { "cve": "CVE-2024-30098", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30098", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30098.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30098" }, { "cve": "CVE-2024-35270", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35270", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35270.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-35270" }, { "cve": "CVE-2024-37969", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37969", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37969.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37969" }, { "cve": "CVE-2024-37970", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37970" }, { "cve": "CVE-2024-37974", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37974", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37974.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37974" }, { "cve": "CVE-2024-37981", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2024-37981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37981.json" } ], "title": "CVE-2024-37981" }, { "cve": "CVE-2024-37986", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37986", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37986.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37986" }, { "cve": "CVE-2024-37987", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37987", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37987.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37987" }, { "cve": "CVE-2024-38013", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38013.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38013" }, { "cve": "CVE-2024-38022", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38022", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38022.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38022" }, { "cve": "CVE-2024-38025", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38025" }, { "cve": "CVE-2024-38034", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38034", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38034.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38034" }, { "cve": "CVE-2024-38041", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "references": [ { "category": "self", "summary": "CVE-2024-38041", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38041.json" } ], "title": "CVE-2024-38041" }, { "cve": "CVE-2024-38043", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38043.json" } ], "title": "CVE-2024-38043" }, { "cve": "CVE-2024-38517", "references": [ { "category": "self", "summary": "CVE-2024-38517", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38517.json" } ], "title": "CVE-2024-38517" }, { "cve": "CVE-2024-38051", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38051", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38051.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38051" }, { "cve": "CVE-2024-38054", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38054", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38054.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38054" }, { "cve": "CVE-2024-38055", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38055", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38055.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38055" }, { "cve": "CVE-2024-38056", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38056", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38056.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38056" }, { "cve": "CVE-2024-38060", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38060", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38060.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38060" }, { "cve": "CVE-2024-38061", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38061" }, { "cve": "CVE-2024-38062", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-38062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38062.json" } ], "title": "CVE-2024-38062" }, { "cve": "CVE-2024-38064", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38064" }, { "cve": "CVE-2024-38085", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38085.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38085" }, { "cve": "CVE-2024-38091", "cwe": { "id": "CWE-166", "name": "Improper Handling of Missing Special Element" }, "notes": [ { "category": "other", "text": "Improper Handling of Missing Special Element", "title": "CWE-166" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38091", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38091.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38091" }, { "cve": "CVE-2024-38102", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38102", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38102.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38102" }, { "cve": "CVE-2024-38104", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38104", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38104.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38104" }, { "cve": "CVE-2024-30013", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2024-30013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30013.json" } ], "title": "CVE-2024-30013" }, { "cve": "CVE-2024-30071", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30071.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30071" }, { "cve": "CVE-2024-30079", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30079" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "product_status": { "known_affected": [ "CSAFPID-1497114" ] }, "references": [ { "category": "self", "summary": "CVE-2024-3596", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1497114" ] } ], "title": "CVE-2024-3596" }, { "cve": "CVE-2024-37971", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37971.json" } ], "title": "CVE-2024-37971" }, { "cve": "CVE-2024-37972", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37972", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37972.json" } ], "title": "CVE-2024-37972" }, { "cve": "CVE-2024-37973", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37973", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37973.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37973" }, { "cve": "CVE-2024-37975", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37975", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37975.json" } ], "title": "CVE-2024-37975" }, { "cve": "CVE-2024-37984", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37984", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37984.json" } ], "title": "CVE-2024-37984" }, { "cve": "CVE-2024-37988", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37988", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37988.json" } ], "title": "CVE-2024-37988" }, { "cve": "CVE-2024-37989", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37989.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37989" }, { "cve": "CVE-2024-38010", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38010.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38010" }, { "cve": "CVE-2024-38011", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38011", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38011.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38011" }, { "cve": "CVE-2024-38017", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38017", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38017.json" } ], "title": "CVE-2024-38017" }, { "cve": "CVE-2024-38019", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38019", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38019.json" } ], "title": "CVE-2024-38019" }, { "cve": "CVE-2024-38027", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38027", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38027.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38027" }, { "cve": "CVE-2024-38028", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38028", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38028.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38028" }, { "cve": "CVE-2024-38030", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38030", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38030.json" } ], "title": "CVE-2024-38030" }, { "cve": "CVE-2024-38033", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38033.json" } ], "title": "CVE-2024-38033" }, { "cve": "CVE-2024-38047", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38047", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38047.json" } ], "title": "CVE-2024-38047" }, { "cve": "CVE-2024-38048", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38048", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38048.json" } ], "title": "CVE-2024-38048" }, { "cve": "CVE-2024-38049", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38049", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38049.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38049" }, { "cve": "CVE-2024-38050", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38050", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38050.json" } ], "title": "CVE-2024-38050" }, { "cve": "CVE-2024-38052", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38052", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38052.json" } ], "title": "CVE-2024-38052" }, { "cve": "CVE-2024-38053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38053.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38053" }, { "cve": "CVE-2024-38057", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38057", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38057.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38057" }, { "cve": "CVE-2024-38058", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38058", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38058" }, { "cve": "CVE-2024-38065", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38065", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38065.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38065" }, { "cve": "CVE-2024-38066", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38066.json" } ], "title": "CVE-2024-38066" }, { "cve": "CVE-2024-38068", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38068.json" } ], "title": "CVE-2024-38068" }, { "cve": "CVE-2024-38069", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "other", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38069", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38069.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38069" }, { "cve": "CVE-2024-38070", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38070", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38070.json" } ], "title": "CVE-2024-38070" }, { "cve": "CVE-2024-38079", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38079.json" } ], "title": "CVE-2024-38079" }, { "cve": "CVE-2024-38101", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38101", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38101.json" } ], "title": "CVE-2024-38101" }, { "cve": "CVE-2024-38105", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38105", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38105.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38105" }, { "cve": "CVE-2024-39684", "references": [ { "category": "self", "summary": "CVE-2024-39684", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39684.json" } ], "title": "CVE-2024-39684" }, { "cve": "CVE-2024-38015", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38015", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38015.json" } ], "title": "CVE-2024-38015" }, { "cve": "CVE-2024-38071", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "references": [ { "category": "self", "summary": "CVE-2024-38071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38071.json" } ], "title": "CVE-2024-38071" }, { "cve": "CVE-2024-38072", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-38072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38072.json" } ], "title": "CVE-2024-38072" }, { "cve": "CVE-2024-38077", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38077", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38077.json" } ], "title": "CVE-2024-38077" }, { "cve": "CVE-2024-38100", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "references": [ { "category": "self", "summary": "CVE-2024-38100", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38100.json" } ], "title": "CVE-2024-38100" }, { "cve": "CVE-2024-38031", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38031.json" } ], "title": "CVE-2024-38031" }, { "cve": "CVE-2024-38044", "cwe": { "id": "CWE-197", "name": "Numeric Truncation Error" }, "notes": [ { "category": "other", "text": "Numeric Truncation Error", "title": "CWE-197" } ], "references": [ { "category": "self", "summary": "CVE-2024-38044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38044.json" } ], "title": "CVE-2024-38044" }, { "cve": "CVE-2024-38067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38067", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38067.json" } ], "title": "CVE-2024-38067" }, { "cve": "CVE-2024-38073", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-38073", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38073.json" } ], "title": "CVE-2024-38073" }, { "cve": "CVE-2024-38074", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2024-38074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38074.json" } ], "title": "CVE-2024-38074" }, { "cve": "CVE-2024-38076", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38076.json" } ], "title": "CVE-2024-38076" }, { "cve": "CVE-2024-38099", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "references": [ { "category": "self", "summary": "CVE-2024-38099", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38099.json" } ], "title": "CVE-2024-38099" }, { "cve": "CVE-2024-38059", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38059", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38059.json" } ], "title": "CVE-2024-38059" }, { "cve": "CVE-2024-38080", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-38080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38080.json" } ], "title": "CVE-2024-38080" }, { "cve": "CVE-2024-26184", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-26184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26184.json" } ], "title": "CVE-2024-26184" }, { "cve": "CVE-2024-37977", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-37977", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37977.json" } ], "title": "CVE-2024-37977" }, { "cve": "CVE-2024-38032", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38032.json" } ], "title": "CVE-2024-38032" }, { "cve": "CVE-2024-38078", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38078", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38078.json" } ], "title": "CVE-2024-38078" }, { "cve": "CVE-2024-37985", "references": [ { "category": "self", "summary": "CVE-2024-37985", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37985.json" } ], "title": "CVE-2024-37985" }, { "cve": "CVE-2024-37978", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-37978", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37978.json" } ], "title": "CVE-2024-37978" } ] }
ncsc-2024-0279
Vulnerability from csaf_ncscnl
Published
2024-07-09 18:40
Modified
2024-07-09 18:40
Summary
Kwetsbaarheden verholpen in Microsoft Windows
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Microsoft heeft kwetsbaarheden verholpen in Windows.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorieën schade:
- Denial-of-Service (DoS)
- Omzeilen van beveiligingsmaatregel
- (Remote) code execution (Administrator/Root rechten)
- (Remote) code execution (Gebruikersrechten)
- SQL Injection
- Toegang tot systeemgegevens
- Verhoogde gebruikersrechten
De ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten.
```
---
Windows Server Backup:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows PowerShell:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten |
| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Desktop:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38015 | 7.50 | Denial-of-Service |
| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Image Acquisition:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Internet Connection Sharing (ICS):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38102 | 6.50 | Denial-of-Service |
| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code |
| CVE-2024-38101 | 6.50 | Denial-of-Service |
| CVE-2024-38105 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Intel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Online Certificate Status Protocol (OCSP):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38031 | 7.50 | Denial-of-Service |
| CVE-2024-38067 | 7.50 | Denial-of-Service |
| CVE-2024-38068 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows COM Session:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Kernel:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Secure Boot:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel |
| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Kernel-Mode Drivers:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Win32 Kernel Subsystem:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Microsoft Windows Codecs Library:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens |
| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Workstation Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows LockDown Policy (WLDP):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Microsoft Graphics Component:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code |
| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows MultiPoint Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Line Printer Daemon Service (LPD):
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38027 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
NDIS:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38048 | 6.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows CoreMessaging:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Access Connection Manager:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens |
| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Cryptographic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Win32K - GRFX:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Role: Windows Hyper-V:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
NPS RADIUS Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Microsoft Streaming Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Remote Desktop Licensing Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38071 | 7.50 | Denial-of-Service |
| CVE-2024-38072 | 7.50 | Denial-of-Service |
| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code |
| CVE-2024-38073 | 7.50 | Denial-of-Service |
| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code |
| CVE-2024-38099 | 5.90 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows NTLM:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Microsoft WS-Discovery:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38091 | 7.50 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Distributed Transaction Coordinator:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Performance Monitor:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code |
| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
XBox Crypto Graphic Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code |
| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows iSCSI:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-35270 | 5.30 | Denial-of-Service |
|----------------|------|-------------------------------------|
Windows Enroll Engine:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Windows Fax and Scan Service:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows TCP/IP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows DHCP Server:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code |
|----------------|------|-------------------------------------|
Windows Themes:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker |
|----------------|------|-------------------------------------|
Windows Message Queuing:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens |
|----------------|------|-------------------------------------|
Windows Win32K - ICOMP:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Active Directory Rights Management Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten |
| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows BitLocker:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
Role: Active Directory Certificate Services; Active Directory Domain Services:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows Filtering:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten |
|----------------|------|-------------------------------------|
Windows MSHTML Platform:
|----------------|------|-------------------------------------|
| CVE-ID | CVSS | Impact |
|----------------|------|-------------------------------------|
| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel |
|----------------|------|-------------------------------------|
---
```
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:
https://portal.msrc.microsoft.com/en-us/security-guidance
Dreigingsinformatie
Kans
medium
Schade
high
CWE-121
Stack-based Buffer Overflow
CWE-122
Heap-based Buffer Overflow
CWE-125
Out-of-bounds Read
CWE-126
Buffer Over-read
CWE-130
Improper Handling of Length Parameter Inconsistency
CWE-166
Improper Handling of Missing Special Element
CWE-190
Integer Overflow or Wraparound
CWE-191
Integer Underflow (Wrap or Wraparound)
CWE-197
Numeric Truncation Error
CWE-20
Improper Input Validation
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-284
Improper Access Control
CWE-287
Improper Authentication
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE-328
Use of Weak Hash
CWE-347
Improper Verification of Cryptographic Signature
CWE-400
Uncontrolled Resource Consumption
CWE-415
Double Free
CWE-416
Use After Free
CWE-476
NULL Pointer Dereference
CWE-59
Improper Link Resolution Before File Access ('Link Following')
CWE-668
Exposure of Resource to Wrong Sphere
CWE-674
Uncontrolled Recursion
CWE-693
Protection Mechanism Failure
CWE-73
External Control of File Name or Path
CWE-822
Untrusted Pointer Dereference
CWE-843
Access of Resource Using Incompatible Type ('Type Confusion')
CWE-908
Use of Uninitialized Resource
CWE-924
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Microsoft heeft kwetsbaarheden verholpen in Windows.\n\n", "title": "Feiten" }, { "category": "description", "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Omzeilen van beveiligingsmaatregel\n- (Remote) code execution (Administrator/Root rechten)\n- (Remote) code execution (Gebruikersrechten)\n- SQL Injection\n- Toegang tot systeemgegevens\n- Verhoogde gebruikersrechten\n\n\nDe ernstigste kwetsbaarheden hebben kenmerk CVE-2024-38076, CVE-2024-38074 en CVE-2024-38076 toegewezen gekregen en bevindt zich in Windows Remote Desktop Licensing Service. Een ongeauthenticeerde kwaadwillende kan de kwetsbaarheid misbruiken om willekeurige code uit te voeren met verhoogde rechten. \n\n```\n\n---\nWindows Server Backup: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38013 | 6.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows PowerShell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38043 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38033 | 7.30 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38047 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38015 | 7.50 | Denial-of-Service | \n| CVE-2024-38076 | 9.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Image Acquisition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38022 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Internet Connection Sharing (ICS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38102 | 6.50 | Denial-of-Service | \n| CVE-2024-38053 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38101 | 6.50 | Denial-of-Service | \n| CVE-2024-38105 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nIntel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37985 | 5.90 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38031 | 7.50 | Denial-of-Service | \n| CVE-2024-38067 | 7.50 | Denial-of-Service | \n| CVE-2024-38068 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows COM Session: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38100 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38041 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Secure Boot: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-28899 | 8.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37969 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37970 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37974 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37981 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37986 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37987 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-26184 | 6.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37971 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37972 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37973 | 7.80 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37975 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37977 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37978 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37984 | 8.40 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37988 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37989 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38010 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38011 | 8.00 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-38065 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38062 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Win32 Kernel Subsystem: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38085 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Codecs Library: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38055 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38056 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-38060 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Workstation Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38050 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows LockDown Policy (WLDP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38070 | 7.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38051 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MultiPoint Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30013 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nLine Printer Daemon Service (LPD): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38027 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nNDIS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38048 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows CoreMessaging: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-21417 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Access Connection Manager: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30071 | 4.70 | Toegang tot gevoelige gegevens | \n| CVE-2024-30079 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30098 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - GRFX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38066 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38080 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nNPS RADIUS Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-3596 | 7.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft Streaming Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38054 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38052 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-38057 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38071 | 7.50 | Denial-of-Service | \n| CVE-2024-38072 | 7.50 | Denial-of-Service | \n| CVE-2024-38077 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38073 | 7.50 | Denial-of-Service | \n| CVE-2024-38074 | 9.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38099 | 5.90 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows NTLM: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30081 | 7.10 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nMicrosoft WS-Discovery: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38091 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Distributed Transaction Coordinator: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38049 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Performance Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38025 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38019 | 7.20 | Uitvoeren van willekeurige code | \n| CVE-2024-38028 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nXBox Crypto Graphic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38032 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38078 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows iSCSI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-35270 | 5.30 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Enroll Engine: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38069 | 7.00 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Fax and Scan Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38104 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows TCP/IP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38064 | 7.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows DHCP Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38044 | 7.20 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Themes: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38030 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Message Queuing: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38017 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Win32K - ICOMP: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38059 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nActive Directory Rights Management Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38517 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-39684 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38058 | 6.80 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Active Directory Certificate Services; Active Directory Domain Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38061 | 7.50 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Filtering: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38034 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38112 | 7.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\n\n---\n\n```", "title": "Interpretaties" }, { "category": "description", "text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance", "title": "Oplossingen" }, { "category": "description", "text": " ", "title": "Dreigingsinformatie" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Stack-based Buffer Overflow", "title": "CWE-121" }, { "category": "general", "text": "Heap-based Buffer Overflow", "title": "CWE-122" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Buffer Over-read", "title": "CWE-126" }, { "category": "general", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" }, { "category": "general", "text": "Improper Handling of Missing Special Element", "title": "CWE-166" }, { "category": "general", "text": "Integer Overflow or Wraparound", "title": "CWE-190" }, { "category": "general", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" }, { "category": "general", "text": "Numeric Truncation Error", "title": "CWE-197" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Improper Authentication", "title": "CWE-287" }, { "category": "general", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" }, { "category": "general", "text": "Use of Weak Hash", "title": "CWE-328" }, { "category": "general", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Double Free", "title": "CWE-415" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" }, { "category": "general", "text": "Exposure of Resource to Wrong Sphere", "title": "CWE-668" }, { "category": "general", "text": "Uncontrolled Recursion", "title": "CWE-674" }, { "category": "general", "text": "Protection Mechanism Failure", "title": "CWE-693" }, { "category": "general", "text": "External Control of File Name or Path", "title": "CWE-73" }, { "category": "general", "text": "Untrusted Pointer Dereference", "title": "CWE-822" }, { "category": "general", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "general", "text": "Use of Uninitialized Resource", "title": "CWE-908" }, { "category": "general", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "title": "Kwetsbaarheden verholpen in Microsoft Windows", "tracking": { "current_release_date": "2024-07-09T18:40:21.043319Z", "id": "NCSC-2024-0279", "initial_release_date": "2024-07-09T18:40:21.043319Z", "revision_history": [ { "date": "2024-07-09T18:40:21.043319Z", "number": "0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "rfc", "product": { "name": "rfc", "product_id": "CSAFPID-1497114", "product_identification_helper": { "cpe": "cpe:2.3:a:ietf:rfc:2865:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "ietf" }, { "branches": [ { "category": "product_name", "name": "windows_10_version_1507", "product": { "name": "windows_10_version_1507", "product_id": "CSAFPID-1453769", "product_identification_helper": { "cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*" } } } ], "category": "vendor", "name": "microsoft" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-21417", "references": [ { "category": "self", "summary": "CVE-2024-21417", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-21417.json" } ], "title": "CVE-2024-21417" }, { "cve": "CVE-2024-28899", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-28899", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28899.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-28899" }, { "cve": "CVE-2024-30081", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30081", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30081.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30081" }, { "cve": "CVE-2024-30098", "cwe": { "id": "CWE-327", "name": "Use of a Broken or Risky Cryptographic Algorithm" }, "notes": [ { "category": "other", "text": "Use of a Broken or Risky Cryptographic Algorithm", "title": "CWE-327" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30098", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30098.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30098" }, { "cve": "CVE-2024-35270", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-35270", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35270.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-35270" }, { "cve": "CVE-2024-37969", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37969", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37969.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37969" }, { "cve": "CVE-2024-37970", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37970", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37970.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37970" }, { "cve": "CVE-2024-37974", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37974", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37974.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37974" }, { "cve": "CVE-2024-37981", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2024-37981", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37981.json" } ], "title": "CVE-2024-37981" }, { "cve": "CVE-2024-37986", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37986", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37986.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37986" }, { "cve": "CVE-2024-37987", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "notes": [ { "category": "other", "text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)", "title": "CWE-843" }, { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37987", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37987.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37987" }, { "cve": "CVE-2024-38013", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38013.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38013" }, { "cve": "CVE-2024-38022", "cwe": { "id": "CWE-59", "name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)" }, "notes": [ { "category": "other", "text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "title": "CWE-59" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38022", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38022.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38022" }, { "cve": "CVE-2024-38025", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38025", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38025.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38025" }, { "cve": "CVE-2024-38034", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38034", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38034.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38034" }, { "cve": "CVE-2024-38041", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "references": [ { "category": "self", "summary": "CVE-2024-38041", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38041.json" } ], "title": "CVE-2024-38041" }, { "cve": "CVE-2024-38043", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38043.json" } ], "title": "CVE-2024-38043" }, { "cve": "CVE-2024-38517", "references": [ { "category": "self", "summary": "CVE-2024-38517", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38517.json" } ], "title": "CVE-2024-38517" }, { "cve": "CVE-2024-38051", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38051", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38051.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38051" }, { "cve": "CVE-2024-38054", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38054", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38054.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38054" }, { "cve": "CVE-2024-38055", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38055", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38055.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38055" }, { "cve": "CVE-2024-38056", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38056", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38056.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38056" }, { "cve": "CVE-2024-38060", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38060", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38060.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38060" }, { "cve": "CVE-2024-38061", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38061", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38061.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38061" }, { "cve": "CVE-2024-38062", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-38062", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38062.json" } ], "title": "CVE-2024-38062" }, { "cve": "CVE-2024-38064", "cwe": { "id": "CWE-908", "name": "Use of Uninitialized Resource" }, "notes": [ { "category": "other", "text": "Use of Uninitialized Resource", "title": "CWE-908" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38064", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38064.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38064" }, { "cve": "CVE-2024-38085", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38085.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38085" }, { "cve": "CVE-2024-38091", "cwe": { "id": "CWE-166", "name": "Improper Handling of Missing Special Element" }, "notes": [ { "category": "other", "text": "Improper Handling of Missing Special Element", "title": "CWE-166" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38091", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38091.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38091" }, { "cve": "CVE-2024-38102", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38102", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38102.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38102" }, { "cve": "CVE-2024-38104", "cwe": { "id": "CWE-822", "name": "Untrusted Pointer Dereference" }, "notes": [ { "category": "other", "text": "Untrusted Pointer Dereference", "title": "CWE-822" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38104", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38104.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38104" }, { "cve": "CVE-2024-30013", "cwe": { "id": "CWE-415", "name": "Double Free" }, "notes": [ { "category": "other", "text": "Double Free", "title": "CWE-415" } ], "references": [ { "category": "self", "summary": "CVE-2024-30013", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30013.json" } ], "title": "CVE-2024-30013" }, { "cve": "CVE-2024-30071", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30071.json" } ], "scores": [ { "cvss_v3": { "baseScore": 4.7, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30071" }, { "cve": "CVE-2024-30079", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-30079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30079.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-30079" }, { "cve": "CVE-2024-3596", "cwe": { "id": "CWE-924", "name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel" }, "notes": [ { "category": "other", "text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel", "title": "CWE-924" }, { "category": "other", "text": "Use of Weak Hash", "title": "CWE-328" } ], "product_status": { "known_affected": [ "CSAFPID-1497114" ] }, "references": [ { "category": "self", "summary": "CVE-2024-3596", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1497114" ] } ], "title": "CVE-2024-3596" }, { "cve": "CVE-2024-37971", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37971", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37971.json" } ], "title": "CVE-2024-37971" }, { "cve": "CVE-2024-37972", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37972", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37972.json" } ], "title": "CVE-2024-37972" }, { "cve": "CVE-2024-37973", "cwe": { "id": "CWE-674", "name": "Uncontrolled Recursion" }, "notes": [ { "category": "other", "text": "Uncontrolled Recursion", "title": "CWE-674" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37973", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37973.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37973" }, { "cve": "CVE-2024-37975", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37975", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37975.json" } ], "title": "CVE-2024-37975" }, { "cve": "CVE-2024-37984", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37984", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37984.json" } ], "title": "CVE-2024-37984" }, { "cve": "CVE-2024-37988", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37988", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37988.json" } ], "title": "CVE-2024-37988" }, { "cve": "CVE-2024-37989", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-37989", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37989.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-37989" }, { "cve": "CVE-2024-38010", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38010", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38010.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38010" }, { "cve": "CVE-2024-38011", "cwe": { "id": "CWE-130", "name": "Improper Handling of Length Parameter Inconsistency" }, "notes": [ { "category": "other", "text": "Improper Handling of Length Parameter Inconsistency", "title": "CWE-130" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38011", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38011.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38011" }, { "cve": "CVE-2024-38017", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38017", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38017.json" } ], "title": "CVE-2024-38017" }, { "cve": "CVE-2024-38019", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38019", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38019.json" } ], "title": "CVE-2024-38019" }, { "cve": "CVE-2024-38027", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38027", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38027.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38027" }, { "cve": "CVE-2024-38028", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38028", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38028.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.2, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38028" }, { "cve": "CVE-2024-38030", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38030", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38030.json" } ], "title": "CVE-2024-38030" }, { "cve": "CVE-2024-38033", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38033", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38033.json" } ], "title": "CVE-2024-38033" }, { "cve": "CVE-2024-38047", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "references": [ { "category": "self", "summary": "CVE-2024-38047", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38047.json" } ], "title": "CVE-2024-38047" }, { "cve": "CVE-2024-38048", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38048", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38048.json" } ], "title": "CVE-2024-38048" }, { "cve": "CVE-2024-38049", "cwe": { "id": "CWE-73", "name": "External Control of File Name or Path" }, "notes": [ { "category": "other", "text": "External Control of File Name or Path", "title": "CWE-73" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38049", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38049.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38049" }, { "cve": "CVE-2024-38050", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38050", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38050.json" } ], "title": "CVE-2024-38050" }, { "cve": "CVE-2024-38052", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38052", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38052.json" } ], "title": "CVE-2024-38052" }, { "cve": "CVE-2024-38053", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38053", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38053.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38053" }, { "cve": "CVE-2024-38057", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38057", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38057.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38057" }, { "cve": "CVE-2024-38058", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38058", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38058.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38058" }, { "cve": "CVE-2024-38065", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38065", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38065.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38065" }, { "cve": "CVE-2024-38066", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38066", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38066.json" } ], "title": "CVE-2024-38066" }, { "cve": "CVE-2024-38068", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38068", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38068.json" } ], "title": "CVE-2024-38068" }, { "cve": "CVE-2024-38069", "cwe": { "id": "CWE-347", "name": "Improper Verification of Cryptographic Signature" }, "notes": [ { "category": "other", "text": "Improper Verification of Cryptographic Signature", "title": "CWE-347" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38069", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38069.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.0, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38069" }, { "cve": "CVE-2024-38070", "cwe": { "id": "CWE-693", "name": "Protection Mechanism Failure" }, "notes": [ { "category": "other", "text": "Protection Mechanism Failure", "title": "CWE-693" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38070", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38070.json" } ], "title": "CVE-2024-38070" }, { "cve": "CVE-2024-38079", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38079", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38079.json" } ], "title": "CVE-2024-38079" }, { "cve": "CVE-2024-38101", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38101", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38101.json" } ], "title": "CVE-2024-38101" }, { "cve": "CVE-2024-38105", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1453769" ] }, "references": [ { "category": "self", "summary": "CVE-2024-38105", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38105.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1453769" ] } ], "title": "CVE-2024-38105" }, { "cve": "CVE-2024-39684", "references": [ { "category": "self", "summary": "CVE-2024-39684", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39684.json" } ], "title": "CVE-2024-39684" }, { "cve": "CVE-2024-38015", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38015", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38015.json" } ], "title": "CVE-2024-38015" }, { "cve": "CVE-2024-38071", "cwe": { "id": "CWE-126", "name": "Buffer Over-read" }, "notes": [ { "category": "other", "text": "Buffer Over-read", "title": "CWE-126" } ], "references": [ { "category": "self", "summary": "CVE-2024-38071", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38071.json" } ], "title": "CVE-2024-38071" }, { "cve": "CVE-2024-38072", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" } ], "references": [ { "category": "self", "summary": "CVE-2024-38072", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38072.json" } ], "title": "CVE-2024-38072" }, { "cve": "CVE-2024-38077", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38077", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38077.json" } ], "title": "CVE-2024-38077" }, { "cve": "CVE-2024-38100", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" } ], "references": [ { "category": "self", "summary": "CVE-2024-38100", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38100.json" } ], "title": "CVE-2024-38100" }, { "cve": "CVE-2024-38031", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38031", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38031.json" } ], "title": "CVE-2024-38031" }, { "cve": "CVE-2024-38044", "cwe": { "id": "CWE-197", "name": "Numeric Truncation Error" }, "notes": [ { "category": "other", "text": "Numeric Truncation Error", "title": "CWE-197" } ], "references": [ { "category": "self", "summary": "CVE-2024-38044", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38044.json" } ], "title": "CVE-2024-38044" }, { "cve": "CVE-2024-38067", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "references": [ { "category": "self", "summary": "CVE-2024-38067", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38067.json" } ], "title": "CVE-2024-38067" }, { "cve": "CVE-2024-38073", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "references": [ { "category": "self", "summary": "CVE-2024-38073", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38073.json" } ], "title": "CVE-2024-38073" }, { "cve": "CVE-2024-38074", "cwe": { "id": "CWE-191", "name": "Integer Underflow (Wrap or Wraparound)" }, "notes": [ { "category": "other", "text": "Integer Underflow (Wrap or Wraparound)", "title": "CWE-191" } ], "references": [ { "category": "self", "summary": "CVE-2024-38074", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38074.json" } ], "title": "CVE-2024-38074" }, { "cve": "CVE-2024-38076", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38076", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38076.json" } ], "title": "CVE-2024-38076" }, { "cve": "CVE-2024-38099", "cwe": { "id": "CWE-287", "name": "Improper Authentication" }, "notes": [ { "category": "other", "text": "Improper Authentication", "title": "CWE-287" } ], "references": [ { "category": "self", "summary": "CVE-2024-38099", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38099.json" } ], "title": "CVE-2024-38099" }, { "cve": "CVE-2024-38059", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38059", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38059.json" } ], "title": "CVE-2024-38059" }, { "cve": "CVE-2024-38080", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-38080", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38080.json" } ], "title": "CVE-2024-38080" }, { "cve": "CVE-2024-26184", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "notes": [ { "category": "other", "text": "Integer Overflow or Wraparound", "title": "CWE-190" } ], "references": [ { "category": "self", "summary": "CVE-2024-26184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26184.json" } ], "title": "CVE-2024-26184" }, { "cve": "CVE-2024-37977", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-37977", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37977.json" } ], "title": "CVE-2024-37977" }, { "cve": "CVE-2024-38032", "cwe": { "id": "CWE-122", "name": "Heap-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Heap-based Buffer Overflow", "title": "CWE-122" } ], "references": [ { "category": "self", "summary": "CVE-2024-38032", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38032.json" } ], "title": "CVE-2024-38032" }, { "cve": "CVE-2024-38078", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "references": [ { "category": "self", "summary": "CVE-2024-38078", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38078.json" } ], "title": "CVE-2024-38078" }, { "cve": "CVE-2024-37985", "references": [ { "category": "self", "summary": "CVE-2024-37985", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37985.json" } ], "title": "CVE-2024-37985" }, { "cve": "CVE-2024-37978", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "other", "text": "Stack-based Buffer Overflow", "title": "CWE-121" } ], "references": [ { "category": "self", "summary": "CVE-2024-37978", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37978.json" } ], "title": "CVE-2024-37978" } ] }
ghsa-v3vx-gxfc-r83r
Vulnerability from github
Published
2024-07-09 18:30
Modified
2024-07-09 18:30
Severity ?
Details
DHCP Server Service Remote Code Execution Vulnerability
{ "affected": [], "aliases": [ "CVE-2024-38044" ], "database_specific": { "cwe_ids": [ "CWE-197", "CWE-681" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-07-09T17:15:32Z", "severity": "HIGH" }, "details": "DHCP Server Service Remote Code Execution Vulnerability", "id": "GHSA-v3vx-gxfc-r83r", "modified": "2024-07-09T18:30:51Z", "published": "2024-07-09T18:30:51Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38044" }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38044" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.