Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

Microsoft Patch Tuesday August 2024 Several Critical Vulnerability and Actively Exploited Vulnerabilities

Microsoft has released their August 2024 security update, which addressed 90 vulnerabilities. Among these vulnerabilities, Arctic Wolf has highlighted 15.
Arctic Wolf Security Bulletin
6 min read

On August 13, 2024, Microsoft released their August 2024 security update, which addressed 90 vulnerabilities. Among these vulnerabilities, Arctic Wolf has highlighted 15 in this security bulletin that include: 

  • Vulnerabilities labeled by Microsoft as Critical severity. 
  • 6 vulnerabilities reported to have been exploited in the wild. 

Vulnerabilities 

Vulnerability  CVSS  Affected Product  Description  Exploited? 
CVE-2024-38106  7.0  Windows  Windows Kernel Elevation of Privilege Vulnerability – A local threat actor can exploit this vulnerability to obtain SYSTEM privileges by winning a race condition.  Yes 
CVE-2024-38107  7.8  Windows  Windows Power Dependency Coordinator Elevation of Privilege Vulnerability – A local threat actor can exploit this vulnerability to obtain SYSTEM privileges.  Yes 
CVE-2024-38178  7.5  Windows  Scripting Engine Memory Corruption Vulnerability – A remote threat actor can exploit this by getting an authenticated client to click a crafted URL, allowing an unauthenticated threat actor to initiate Remote Code Execution (RCE) if the target uses Edge in Internet Explorer Mode.  Yes 
CVE-2024-38193  7.8  Windows  Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability – A local threat actor can exploit this vulnerability to obtain SYSTEM privileges.  Yes 
CVE-2024-38213  6.5  Windows  Windows Mark of the Web Security Feature Bypass Vulnerability – A remote threat actor can exploit this vulnerability by having a victim open a malicious file they have sent. Exploiting this vulnerability could bypass SmartScreen protection.  Yes 
CVE-2024-38160, CVE-2024-38159  9.1  Windows  Windows Network Virtualization RCE Vulnerability – A remote threat actor can exploit this vulnerability in the wnv.sys component of Windows Server 2016 by manipulating the Memory Descriptor List (MDL), leading to unauthorized memory writes or a critical guest-to-host escape. Exploitation requires elevated privileges and could allow control over other tenants’ applications and content.  No 
CVE-2024-38140  9.8  Windows  Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability – A remote unauthenticated threat actor can exploit this vulnerability by sending specially crafted packets to a Windows Pragmatic General Multicast (PGM) open socket on the server, requiring no user interaction.  No 
CVE-2024-38063  9.8  Windows  Windows TCP/IP RCE Vulnerability – A remote unauthenticated threat actor can repeatedly send IPv6 packets containing specially crafted data to a Windows machine, potentially enabling RCE.  No 
CVE-2024-38199  9.8  Windows  Windows Line Printer Daemon (LPD) Service RCE Vulnerability – A remote unauthenticated threat actor can send a specially crafted print task to a shared vulnerable Windows Line Printer Daemon (LPD) service across a network, potentially leading to RCE.  No 
CVE-2024-21302  6.7  Windows  Windows Secure Kernel Mode Elevation of Privilege Vulnerability – Part of the Windows Downgrade Attack presented at Black Hat 2024. This vulnerability allows a local threat actor with administrator privileges to replace current Windows system files with outdated versions. Exploiting this could reintroduce previously mitigated vulnerabilities, bypass certain Virtualization Based Security (VBS) features, and exfiltrate data protected by VBS.  No 
CVE-2024-38202  7.3  Windows  Windows Update Stack Elevation of Privilege Vulnerability – Part of the Windows Downgrade Attack presented at Black Hat 2024. This vulnerability allows a local threat actor with basic user privileges to exploit Windows Update, potentially reintroducing previously mitigated vulnerabilities or bypassing some VBS features. Successful exploitation requires additional interaction from a privileged user.  No 
CVE-2024-38189  8.8  Microsoft Office  Microsoft Project RCE Vulnerability – A remote threat actor can exploit this by getting the victim to open a malicious Microsoft Office Project file on a system with macros from the Internet not blocked and VBA Macro Notification Settings disabled, enabling RCE. 

  • Microsoft is developing a security update to mitigate this vulnerability, but it is not yet available. 
Yes 
CVE-2024-38200  6.5  Microsoft Office  Microsoft Office Spoofing Vulnerability – Part of the “NTLM – The Last Ride” DEF CON 2024 talk. In a web-based attack, a remote threat actor can trick a victim into opening a malicious file by sending a link and opening a file.  No 
CVE-2024-38109  9.1  Azure  Azure Health Bot Elevation of Privilege Vulnerability – A remote authenticated threat actor can exploit a Server-Side Request Forgery (SSRF) vulnerability in Microsoft Azure Health Bot to elevate privileges across a network. Microsoft has stated this has been fully mitigated and no action is required by users.  No 

 

Recommendation

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest fixed version. 

Product  CVE  Update 
Windows Server 2022, 23H2 Edition  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041573, 5039236 
Windows Server 2022  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041160, 5039227, 5039330 
Windows Server 2019  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041578, 5039217 
Windows Server 2016  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38159, CVE-2024-38160, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041773, 5039214 
Windows Server 2012 R2  CVE-2024-38063, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041828, 5041770, 5039294 
Windows Server 2012  CVE-2024-38063, CVE-2024-38107, CVE-2024-38140, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041851, 5039260 
Windows Server 2008 R2 for x64-based Systems Service Pack 1  CVE-2024-38063, CVE-2024-38140, CVE-2024-38193, CVE-2024-38199  5041838, 5041823 
Windows Server 2008 for x64-based Systems Service Pack 2  CVE-2024-38063, CVE-2024-38140, CVE-2024-38193, CVE-2024-38199  5041838, 5041823 
Windows Server 2008 for 32-bit Systems Service Pack 2  CVE-2024-38063, CVE-2024-38140, CVE-2024-38193, CVE-2024-38199  5041850, 5041847 
Windows 11 Version 24H2 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199  5041571 
Windows 11 Version 24H2 for ARM64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199  5041571 
Windows 11 Version 23H2 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041585 
Windows 11 Version 23H2 for ARM64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041585, 5039212 
Windows 11 Version 22H2 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041585, 5039212 
Windows 11 Version 22H2 for ARM64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041585, 5039212 
Windows 11 version 21H2 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5039212 
Windows 11 version 21H2 for ARM64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041592, 5039213 
Windows 10 Version 22H2 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041580, 5039211 
Windows 10 Version 22H2 for ARM64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041580, 5039211 
Windows 10 Version 22H2 for 32-bit Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041580, 5039211 
Windows 10 Version 21H2 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041580, 5039211 
Windows 10 Version 21H2 for ARM64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041580, 5039211 
Windows 10 Version 21H2 for 32-bit Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041580, 5039211 
Windows 10 Version 1809 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041578, 5039217 
Windows 10 Version 1809 for ARM64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041578, 5039217 
Windows 10 Version 1809 for 32-bit Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041578 
Windows 10 Version 1607 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38159, CVE-2024-38160, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041773 
Windows 10 Version 1607 for 32-bit Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38159, CVE-2024-38160, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041773, 5039214 
Windows 10 for x64-based Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041782, 5040448 
Windows 10 for 32-bit Systems  CVE-2024-21302, CVE-2024-38063, CVE-2024-38106, CVE-2024-38107, CVE-2024-38140, CVE-2024-38178, CVE-2024-38193, CVE-2024-38199, CVE-2024-38213  5041782, 5040448, 5039225 
Microsoft Project 2016 (64-bit edition)  CVE-2024-38189  5002561 
Microsoft Project 2016 (32-bit edition)  CVE-2024-38189  5002561 
Microsoft Office LTSC 2021 for 64-bit editions  CVE-2024-38189, CVE-2024-38200  Click to Run 
Microsoft Office LTSC 2021 for 32-bit editions  CVE-2024-38189, CVE-2024-38200  Click to Run 
Microsoft Office 2019 for 64-bit editions  CVE-2024-38189, CVE-2024-38200  Click to Run 
Microsoft Office 2019 for 32-bit editions  CVE-2024-38189, CVE-2024-38200  Click to Run 
Microsoft Office 2016 (64-bit edition)  CVE-2024-38200  5002625, 5002570 
  • Note: Microsoft is developing a security update to mitigate CVE-2024-38189, but it is not yet available. 

Please follow your organization’s patching and testing guidelines to avoid any operational impact. 

References 

Share this post: