Lucene search

K
kasperskyKaspersky LabKLA68914
HistoryJun 11, 2024 - 12:00 a.m.

KLA68914 Multiple vulnerabilities in Microsoft Products (ESU)

2024-06-1100:00:00
Kaspersky Lab
threats.kaspersky.com
20
microsoft
esu
denial of service
code execution
remote exploit
privilege escalation
dns
msmq
win32k
kernel-mode driver
wi-fi driver
link layer
streaming service
winlogon
storage management
win32 kernel
rras
ole
dfs
themes
dhcp server

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.9%

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to cause denial of service, execute arbitrary code, gain privileges.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in DNS protocol can be exploited remotely to cause denial of service.
  2. A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
  3. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  4. An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
  5. A remote code execution vulnerability in Windows Wi-Fi Driver can be exploited remotely to execute arbitrary code.
  6. A remote code execution vulnerability in Windows Link Layer Topology Discovery Protocol can be exploited remotely to execute arbitrary code.
  7. An elevation of privilege vulnerability in Microsoft Streaming Service can be exploited remotely to gain privileges.
  8. An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
  9. A remote code execution vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
  12. A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
  13. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  14. A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
  15. A remote code execution vulnerability in Windows Distributed File System (DFS) can be exploited remotely to execute arbitrary code.
  16. A denial of service vulnerability in Windows Themes can be exploited remotely to cause denial of service.
  17. A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.

Original advisories

CVE-2023-50868

CVE-2024-30080

CVE-2024-30091

CVE-2024-35250

CVE-2024-30084

CVE-2024-30078

CVE-2024-30075

CVE-2024-30090

CVE-2024-30066

CVE-2024-30062

CVE-2024-30093

CVE-2024-30087

CVE-2024-30086

CVE-2024-30083

CVE-2024-30095

CVE-2024-30067

CVE-2024-30077

CVE-2024-30082

CVE-2024-30094

CVE-2024-30063

CVE-2024-30074

CVE-2024-30065

CVE-2024-30070

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

Microsoft-Endpoint-Configuration-Manager

CVE list

CVE-2023-50868 warning

CVE-2024-30080 critical

CVE-2024-30091 critical

CVE-2024-35250 critical

CVE-2024-30084 high

CVE-2024-30078 critical

CVE-2024-30075 critical

CVE-2024-30090 high

CVE-2024-30066 high

CVE-2024-30062 critical

CVE-2024-30093 high

CVE-2024-30087 critical

CVE-2024-30086 critical

CVE-2024-30083 critical

CVE-2024-30095 critical

CVE-2024-30067 high

CVE-2024-30077 critical

CVE-2024-30082 critical

CVE-2024-30094 critical

CVE-2024-30063 high

CVE-2024-30074 critical

CVE-2024-30065 high

CVE-2024-30070 critical

KB list

5039260

5039289

5039266

5039294

5039245

5039274

Solution

Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • DoS

Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Windows Server 2012 R2Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Windows Server 2008 R2 for x64-based Systems Service Pack 1Windows Server 2008 for 32-bit Systems Service Pack 2Windows Server 2012 R2 (Server Core installation)Windows Server 2012 (Server Core installation)Windows Server 2008 for x64-based Systems Service Pack 2Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Windows Server 2012

References

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.9%