Webinar Library
Welcome to my May Patch Tuesday newsletter. This month is fairly normal with only 91 patches being relased. Of the 91, we have three that we want to bring attention to. First is CVE-2024-30051 which is both public and being exploited. If sucessful, an attacker would gain SYSTEM privileges. This is most likely a widespread vulnerability being used in conjuction with Qakbot and other malwares. So get this updated ASAP. Next is CVE-2024-30040 which is not yet public but has been detected as exploited in the wild. An attacker would have to get a user to open a specially crafted file to be sucessful with this exploit. As history has shown us, this is not always a hard thing to do. So I suggest you get this tested and updated ASAP. Finally we have CVE-2024-30046. This exploit has a fairly low CVSS score and is rated by Microsoft as "Exploitation less likely". So get this update tested and pushed out when you can. Also, have you had users having issues with VPN disconnections since last month? If so, this is probably related to a regression bug introduced in April's updates. Microsoft reports that KB5036893, which was part of the April 2024 security updates, introduced an issue with devices having VPN disconnection failures. That's the bad news. The good news is that KB5037771, which is part of this month's updates, does resolve the issue.
Patch data provided by:
Technology
Products Affected
Severity
Reference
Workaround/ Exploited / Publicly Disclosed
Vulnerability Info
Windows
Windows 10, 11
Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022 including Server Core Installations
Important
CVE-2024-26238 CVE-2024-29994 CVE-2024-29996 CVE-2024-29997 CVE-2024-29998 CVE-2024-29999 CVE-2024-30000 CVE-2024-30001 CVE-2024-30002 CVE-2024-30003 CVE-2024-30004 CVE-2024-30005 CVE-2024-30006 CVE-2024-30007 CVE-2024-30008 CVE-2024-30009 CVE-2024-30010 CVE-2024-30011 CVE-2024-30012 CVE-2024-30014 CVE-2024-30015 CVE-2024-30016 CVE-2024-30017 CVE-2024-30018 CVE-2024-30019 CVE-2024-30020 CVE-2024-30021 CVE-2024-30022 CVE-2024-30023 CVE-2024-30024 CVE-2024-30025 CVE-2024-30027 CVE-2024-30028 CVE-2024-30029 CVE-2024-30030 CVE-2024-30031 CVE-2024-30032 CVE-2024-30033 CVE-2024-30034 CVE-2024-30035 CVE-2024-30036 CVE-2024-30037 CVE-2024-30038 CVE-2024-30039 CVE-2024-30040 CVE-2024-30049 CVE-2024-30050 CVE-2024-30051
Denial of Service
Elevation of Privilege
Information Disclosure
Remote Code Execution Security Feature Bypass
Edge
Chromium-based
Low
CVE-2024-29986 CVE-2024-29987 CVE-2024-29991 CVE-2024-30055 CVE-2024-3157 CVE-2024-3515 CVE-2024-3516 CVE-2024-3832 CVE-2024-3833 CVE-2024-3834 CVE-2024-3837 CVE-2024-3838 CVE-2024-3839 CVE-2024-3840 CVE-2024-3841 CVE-2024-3843 CVE-2024-3844 CVE-2024-3845 CVE-2024-3846 CVE-2024-3847 CVE-2024-3914 CVE-2024-4058 CVE-2024-4059 CVE-2024-4060 CVE-2024-4331 CVE-2024-4368 CVE-2024-4558 CVE-2024-4559 CVE-2024-4671
Workaround: No Exploited: No Public: No
Information Disclosure Security Feature Bypass Spoofing
Office and SharePoint
365 Apps for Enterprise Excel 2016 Office 2019, LTSC 2021 LTSC for Mac 2021 SharePoint Enterprise Server 2016 SharePoint Server 2019 SharePoint Server Subscription Edition Office Online Server
Critical
CVE-2024-30042 CVE-2024-30043 CVE-2024-30044
Informatio Disclosure Remote Code Execution
SQL Server
PowerBI-client JS SDK
CVE-2024-30054
Developer Tools
.NET 7.0, 8.0
CVE-2024-30045
Remote Code Execution
Visual Studio
2017 15.8 - 15.0 2019 16.11 - 16.0 2022 17.4, 17.6, 17.8, 17.9
CVE-2024-30045 CVE-2024-30046 CVE-2024-32002 CVE-2024-32004
Workaround: No Exploited: No Public: Yes
Denial of Service Remote Code Execution
Apps
Bing Search for iOS Intune Mobile Application Management for Android
CVE-2024-30041 CVE-2024-30059
Spoofing Tampering
Azure
Migrate
CVE-2024-30053
Spoofing
Dynamics
365 Customer Insights
CVE-2024-30047 CVE-2024-30048