Exposure Management

Patch Tuesday - February 2024

|Last updated on Aug 13, 2024|1 min read
LinkedInFacebookX
Patch Tuesday - February 2024

Microsoft is addressing 73 vulnerabilities this February 2024 Patch Tuesday, including two (actually, three!) zero-day/exploited-in-the-wild vulnerabilities, both of which are already included on the CISA KEV list. Today also brings patches for two critical remote code execution (RCE) vulnerabilities, and a critical elevation of privilege vulnerability in Exchange. Six browser vulnerabilities were published separately this month, and are not included in the total.

Windows SmartScreen: exploited-in-the-wild critical security bypass

CVE-2024-21351 describes a security feature bypass vulnerability in Windows SmartScreen. Microsoft has already seen evidence of exploitation in the wild. Successful exploitation requires that the attacker convince the user to open a malicious file. Successful exploitation bypasses the SmartScreen user experience and potentially allows code injection into SmartScreen to achieve remote code execution. Of interest: other critical SmartScreen bypass vulnerabilities from the past couple of years (e.g. CVE-2023-36025 from November 2023) have not included language describing code injection into SmartScreen itself, focusing instead on the security feature bypass only. Microsoft’s own researchers reported both CVE-2024-21351 and CVE-2023-36025.

Internet Shortcut files: exploited-in-the-wild security bypass

If further evidence were ever needed that clicking Internet Shortcut files from unknown sources is typically a bad idea, CVE-2024-21412 provides it. An attacker who convinces a user to open a malicious Internet Shortcut file can bypass the typical dialog which warns that “files from the internet can potentially harm your computer”. Microsoft notes that it has seen exploitation in the wild, although the requirement for user interaction helps keep the severity rating below critical, both for CVSS and Microsoft’s proprietary ranking system.

Microsoft Office: critical RCE

Microsoft Office typically shields users from a variety of attacks by opening files with Mark of the Web in Protected View, which means Office will render the document without fetching potentially malicious external resources. CVE-2024-21413 is a critical RCE vulnerability in Office which allows an attacker to cause a file to open in editing mode as though the user had agreed to trust the file. The Outlook Preview Pane is listed as an attack vector, and no user interaction is required. Microsoft assesses this vulnerability as a critical CVSSv3 base score of 9.8, as well as critical under their own proprietary severity ranking scale. Administrators responsible for Office 2016 installations who apply patches outside of Microsoft Update should note that the advisory lists no fewer than five separate patches which must be installed to achieve remediation of CVE-2024-21413; individual update KB articles further note that partially-patched Office installations will be blocked from starting until the correct combination of patches has been installed.

Windows PGM: critical RCE

Microsoft is patching CVE-2024-21357, a flaw in Windows Pragmatic General Multicast (PGM). When thus vulnerability was first published on Patch Tuesday, the CVSSv3 base score was a relatively mild 7.5, but a day later Microsoft adjusted the CVSSv3 base score so that the Attack Vector was switched from Adjacent to Network, which bumps the CVSSv3 base score up to 8.1. Exploitability language in the FAQ was adjusted from "limited to systems on the same network switch or virtual network" to "Windows Pragmatic General Multicast (PGM) produces multicast traffic that runs on layer 4 and is routable. Therefore this vulnerability can be exploited over the network". This adjustment — which the advisory rather optimistically describes as an informational change only — increases the potential risk posed by CVE-2024-21357.

Unsurprisingly, Microsoft rates CVE-2024-21357 as critical under its own proprietary severity scale. A discrepancy between the two severity ranking systems is always worth noting, and this has quickly proven to be the case here.

A further clue that Microsoft considers this vulnerability particularly serious: patches are available for Windows Server 2008, which is now completely end of life. The advisory is light on detail when it comes to exploitation methods; other recent critical RCE vulnerabilities in Windows PGM have involved Microsoft Message Queuing Service.

Exchange: critical elevation of privilege

Exchange admins may have enjoyed a rare two-month break from patching, but this month sees the publication of CVE-2024-21410, a critical elevation of privilege vulnerability in Exchange. Microsoft explains that an attacker could use NTLM credentials previously acquired via another means to act as the victim on the Exchange server using an NTLM relay attack. One possible avenue for that credential acquisition: an NTLM credential-leaking vulnerability in Outlook such as CVE-2023-36761, which Rapid7 wrote about back in September 2023.

Compounding the concern for defenders: Exchange 2016 is listed as affected, but no patch is yet listed on the CVE-2024-21410 advisory. Exchange 2019 patches are available for CU13 and the newly minted CU14 series. According to Microsoft, Exchange installations where Extended Protection for Authentication (EPA) is already enabled are protected, although Microsoft strongly recommends installing the latest Cumulative Update. Further resources are provided on the advisory, including Microsoft’s generic guidance on mitigating Pass the Hash-style attacks, as well as Microsoft’s Exchange Server Health Checker script, which includes an overview of EPA status. The Exchange 2019 CU14 update series enables EPA by default.

A day after initial publication, Microsoft updated the advisory for CVE-2024-21410 to indicate that they had in fact previously been aware of exploitation.

Lifecycle update

There are no significant end-of-lifecycle changes for Microsoft products this month.

Summary Charts

image.pngimage-1.pngimage-2.png

Summary Tables

Azure vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21401Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege VulnerabilityNoNo9.8
CVE-2024-21364Microsoft Azure Site Recovery Elevation of Privilege VulnerabilityNoNo9.3
CVE-2024-21376Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution VulnerabilityNoNo9
CVE-2024-21403Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege VulnerabilityNoNo9
CVE-2024-21329Azure Connected Machine Agent Elevation of Privilege VulnerabilityNoNo7.3
CVE-2024-21381Microsoft Azure Active Directory B2C Spoofing VulnerabilityNoNo6.8
CVE-2024-20679Azure Stack Hub Spoofing VulnerabilityNoNo6.5
CVE-2024-21397Microsoft Azure File Sync Elevation of Privilege VulnerabilityNoNo5.3

Azure Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-20667Azure DevOps Server Remote Code Execution VulnerabilityNoNo7.5

Browser vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21399Microsoft Edge (Chromium-based) Remote Code Execution VulnerabilityNoNo8.3
CVE-2024-1284Chromium: CVE-2024-1284 Use after free in MojoNoNoN/A
CVE-2024-1283Chromium: CVE-2024-1283 Heap buffer overflow in SkiaNoNoN/A
CVE-2024-1077Chromium: CVE-2024-1077 Use after free in NetworkNoNoN/A
CVE-2024-1060Chromium: CVE-2024-1060 Use after free in CanvasNoNoN/A
CVE-2024-1059Chromium: CVE-2024-1059 Use after free in WebRTCNoNoN/A

Developer Tools vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21386.NET Denial of Service VulnerabilityNoNo7.5
CVE-2024-21404.NET Denial of Service VulnerabilityNoNo7.5

ESU Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21372Windows OLE Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21350Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21352Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21358Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21360Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21361Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21366Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21369Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21375Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21420Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21359Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21365Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21367Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21368Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21370Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21391Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21349Microsoft ActiveX Data Objects Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21363Microsoft Message Queuing (MSMQ) Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-21354Microsoft Message Queuing (MSMQ) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21406Windows Printing Service Spoofing VulnerabilityNoNo7.5
CVE-2024-21357Windows Pragmatic General Multicast (PGM) Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-21347Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-21348Internet Connection Sharing (ICS) Denial of Service VulnerabilityNoNo7.5
CVE-2024-21377Windows DNS Information Disclosure VulnerabilityNoNo7.1
CVE-2024-21371Windows Kernel Elevation of Privilege VulnerabilityNoNo7
CVE-2024-21355Microsoft Message Queuing (MSMQ) Elevation of Privilege VulnerabilityNoNo7
CVE-2024-21405Microsoft Message Queuing (MSMQ) Elevation of Privilege VulnerabilityNoNo7
CVE-2024-21356Windows Lightweight Directory Access Protocol (LDAP) Denial of Service VulnerabilityNoNo6.5
CVE-2024-21343Windows Network Address Translation (NAT) Denial of Service VulnerabilityNoNo5.9
CVE-2024-21344Windows Network Address Translation (NAT) Denial of Service VulnerabilityNoNo5.9
CVE-2024-21340Windows Kernel Information Disclosure VulnerabilityNoNo4.6
CVE-2023-50387MITRE: CVE-2023-50387 DNSSEC verification complexity can be exploited to exhaust CPU resources and stall DNS resolversNoNoN/A

Exchange Server vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21410Microsoft Exchange Server Elevation of Privilege VulnerabilityNoNo9.8

Microsoft Dynamics vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21395Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo8.2
CVE-2024-21380Microsoft Dynamics Business Central/NAV Information Disclosure VulnerabilityNoNo8
CVE-2024-21327Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting VulnerabilityNoNo7.6
CVE-2024-21389Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6
CVE-2024-21393Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6
CVE-2024-21396Dynamics 365 Sales Spoofing VulnerabilityNoNo7.6
CVE-2024-21328Dynamics 365 Sales Spoofing VulnerabilityNoNo7.6
CVE-2024-21394Dynamics 365 Field Service Spoofing VulnerabilityNoNo7.6

Microsoft Office vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21413Microsoft Outlook Remote Code Execution VulnerabilityNoNo9.8
CVE-2024-21378Microsoft Outlook Remote Code Execution VulnerabilityNoNo8
CVE-2024-21379Microsoft Word Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-20673Microsoft Office Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-21384Microsoft Office OneNote Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-21402Microsoft Outlook Elevation of Privilege VulnerabilityNoNo7.1
CVE-2024-20695Skype for Business Information Disclosure VulnerabilityNoNo5.7
CVE-2024-21374Microsoft Teams for Android Information DisclosureNoNo5

System Center vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21315Microsoft Defender for Endpoint Protection Elevation of Privilege VulnerabilityNoNo7.8

Windows vulnerabilities

CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21345Windows Kernel Elevation of Privilege VulnerabilityNoNo8.8
CVE-2024-21353Microsoft WDAC ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21412Internet Shortcut Files Security Feature Bypass VulnerabilityYesNo8.1
CVE-2024-21338Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21346Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21351Windows SmartScreen Security Feature Bypass VulnerabilityYesNo7.6
CVE-2024-21342Windows DNS Client Denial of Service VulnerabilityNoNo7.5
CVE-2024-21341Windows Kernel Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-20684Windows Hyper-V Denial of Service VulnerabilityNoNo6.5
CVE-2024-21339Windows USB Generic Parent Driver Remote Code Execution VulnerabilityNoNo6.4
CVE-2024-21362Windows Kernel Security Feature Bypass VulnerabilityNoNo5.5
CVE-2024-21304Trusted Compute Base Elevation of Privilege VulnerabilityNoNo4.1

Updates

  • 2024-02-14: Updated Exchange vulnerability CVE-2024-21410 after Microsoft adjusted the advisory to indicate that they were aware of in-the-wild exploitation.
  • 2024-02-14: Updated Windows PGM vulnerability CVE-2024-21357 after Microsoft adjusted the advisory to indicate that this vulnerability is exploitable across different networks, when they had previously indicated that attacks would be limited to the same network switch or VLAN.

NEVER MISS AN EMERGING THREAT

Be the first to learn about the latest vulnerabilities and cybersecurity news.

Subscribe Now

Related blog posts