9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
71.9%
Microsoft's June Patch Tuesday is here, bringing fixes for vulnerabilities impacting its multiple products. This month's release highlights the ongoing battle against cybersecurity threats, from critical updates to important fixes. Let's dive into the crucial insights from Microsoft's Patch Tuesday updates for June 2024.
Microsoft Patch Tuesday's June 2024 edition addressed 58vulnerabilities, including onecritical and 50important severity vulnerabilities. In this month's security updates, Microsoft has addressedonezero-day vulnerability known to be exploited in the wild. Microsoft also addressedsevenvulnerabilities in Microsoft Edge (Chromium-based). The vulnerabilities have been patched earlier this month.
Microsoft Patch Tuesday, June edition includes updates for vulnerabilities in Microsoft Office and Components, Visual Studio, Windows Server Service, Windows Kernel, Windows DHCP Server, Azure Storage Library, Azure File Sync, and more.
Microsoft has fixed several flaws in multiple software, including Denial of Service (DoS), Elevation of Privilege (EoP), Information Disclosure, and Remote Code Execution (RCE).
The June 2024 Microsoft vulnerabilities are classified as follows:
Vulnerability Category | Quantity | Severities |
---|---|---|
Denial of Service Vulnerability | 5 | Important: 5 |
Elevation of Privilege Vulnerability | 25 | Important: 25 |
Information Disclosure Vulnerability | 3 | Important: 3 |
Remote Code Execution Vulnerability | 18 | Critical: 1 |
Important: 17 |
Adobe has released10 security advisories to address167vulnerabilities in Adobe Photoshop, Adobe Experience Manager, Adobe Audition, Adobe Media Encoder, Adobe FrameMaker Publishing Server, Adobe Commerce, Adobe ColdFusion, Adobe Substance 3D Stager, Adobe Creative Cloud Desktop, and Adobe Acrobat Android. Of the 167 vulnerabilities,13 are given critical severity ratings. Successful exploitation of these vulnerabilities may lead to security feature bypass, privilege escalation, and arbitrary code execution.
The vulnerability exists in DNSSEC validation that may allow an attacker to exploit standard DNSSEC protocols intended for DNS integrity by using excessive resources on a resolver, causing a denial of service for legitimate users.
This vulnerability was disclosed in February and patched in numerous DNS implementations.
Message Queuing (MSMQ) is a protocol developed by Microsoft to ensure reliable communication between Windows computers across different networks, even when a host is temporarily not connected (by maintaining a message queue of undelivered messages).
To exploit this vulnerability, an attacker must send a malicious MSMQ packet to an MSMQ server. On successful exploitation, an attacker may perform remote code execution on the server side.
This month's release notes cover multiple Microsoft product families and products/versions affected, including, but not limited to, Windows Distributed File System (DFS), Windows Themes, Winlogon, Windows Remote Access Connection Manager, Windows Event Logging Service, Windows Link Layer Topology Discovery Protocol, Windows Container Manager Service, Microsoft WDAC OLE DB provider for SQL, Windows Wi-Fi Driver, Windows Win32K - GRFX, Windows Standards-Based Storage Management Service, Windows Kernel-Mode Drivers, Windows Cloud Files Mini Filter Driver, Windows Win32 Kernel Subsystem, Windows NT OS Kernel, Microsoft Streaming Service, Windows Storage, Windows Routing and Remote Access Service (RRAS), Windows Cryptographic Services, Microsoft Windows Speech, Microsoft Office SharePoint, Microsoft Office, Microsoft Office Word, Microsoft Office Outlook, Dynamics Business Central, Azure Monitor, Azure SDK, Microsoft Dynamics, Windows Perception Service, Azure Data Science Virtual Machines, Microsoft Windows, and Microsoft Edge (Chromium-based).
Qualys VMDR automatically detects new Patch Tuesday vulnerabilities using continuous updates to its Knowledgebase (KB).
You can see all your impacted hosts by these vulnerabilities using the following QQL query:
_vulnerabilities.vulnerability: ( qid:`110467` OR qid:`110468` OR qid:`110469` OR qid:`379940` OR qid:`92142` OR qid:`92143` OR qid:`92144` OR qid:`92145` )_
VMDR rapidly remediates Windows hosts by deploying the most relevant and applicable per-technology version patches. You can simply select respective QIDs in the Patch Catalog and filter on the “Missing” patches to identify and deploy the applicable, available patches with one click.
The following QQL will return the missing patches for this Patch Tuesday:
_( qid:`110467` OR qid:`110468` OR qid:`110469` OR qid:`379940` OR qid:`92142` OR qid:`92143` OR qid:`92144` OR qid:`92145`)_
With Qualys Policy Compliance's Out-of-the-Box Mitigation or Compensatory Controls, the risk of a vulnerability being exploited is reduced when the remediation (fix/patch) cannot be implemented immediately.
Qualys Policy Compliance team releases these exclusive controls based on vendor-suggested Mitigation/Workaround.
Mitigation refers to a setting, standard configuration, or general best-practice existing in a default state that could reduce the severity of the exploitation of a vulnerability.
A workaround is sometimes used temporarily to achieve a task or goal when the usual or planned method isn't working. Information technology often uses a workaround to overcome hardware, programming, or communication problems. Once a problem is fixed, a workaround is usually abandoned.
The following Qualys Policy Compliance Control IDs (CIDs), and System Defined Controls (SDC) have been updated to support Microsoft recommended mitigation(s) for this Patch Tuesday:
CVSS:3.1 9.8 / 8.5
Policy Compliance Control IDs (CIDs):
The following QQL will return a posture assessment for the CIDs for this Patch Tuesday:
control.id: [14297, 14916, 4030]
CVSS:3.1 7.5 / 6.7
Policy Compliance Control IDs (CIDs):
The following QQL will return a posture assessment for the CIDs for this Patch Tuesday:
control.id: [26238]
The next Patch Tuesday falls on July 9, and we'll be back with details and patch analysis. Until next Patch Tuesday, stay safe and secure. Be sure to subscribe to the 'This Month in Vulnerabilities and Patch's webinar.'
The Qualys Research team hosts a monthly webinar series to help our existing customers leverage the seamless integration between Qualys Vulnerability Management Detection Response (VMDR) and Qualys Patch Management. Combining these two solutions can reduce the median time to remediate critical vulnerabilities.
During the webcast, we will discuss this month's high-impact vulnerabilities, including those that are a part of this month's Patch Tuesday alert. We will walk you through the necessary steps to address the key vulnerabilities using Qualys VMDR and Qualys Patch Management.
Join the webinar
This Month in Vulnerabilities & Patches
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.3 High
AI Score
Confidence
High
0.003 Low
EPSS
Percentile
71.9%