Microsoft on Tuesday launched 71 patches touching 10 product households. Seventeen of the addressed points, all affecting Home windows, are thought of by Microsoft to be of Crucial severity and all have a CVSS base rating of 8.1 or larger. Ten of those contain Distant Desktop Companies. At patch time, one of many points addressed (CVE-2024-49138, an Vital-severity Home windows Widespread Log File system driver situation) is understood to be underneath exploit within the wild, with 6 further CVEs extra prone to be exploited within the subsequent 30 days by the corporate’s estimation. 5 of this month’s points are amenable to detection by Sophos protections, and we embrace data on these in a desk under.
Along with these patches, the discharge consists of advisory data on two Edge CVEs (patched final week), a Protection-in-Depth replace for a selected model of Microsoft Undertaking, and knowledge on six bulletins launched by Adobe this week. We’re as all the time together with on the finish of this publish further appendices itemizing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product household.
Lastly, this month we’re including a brand new appendix that breaks out every month’s Home windows Server patches by affected model. Directors are inspired to make use of this appendix as a place to begin to establish their particular publicity, as every reader’s scenario — particularly because it considerations merchandise out of mainstream assist — will differ.
- Complete CVEs: 71
- Publicly disclosed: 1
- Exploit detected: 1
- Severity
- Crucial: 17
- Vital: 54
- Affect
- Distant Code Execution: 31
- Elevation of Privilege: 27
- Info Disclosure: 7
- Denial of Service: 5
- Spoofing: 1
- CVSS base rating 9.0 or better: 1
- CVSS rating 8.0 or better: 27
Determine 1: December’s CVEs embrace no spoofing, denial of service, or safety function bypass points, however there are many Crucial-severity RCEs to maintain system directors busy
Merchandise
- Home windows: 59
- Workplace: 5
- SharePoint: 5
- 365 Apps: 4
- Entry: 1
- Defender: 1
- Excel: 1
- Muzic: 1
- SCOM: 1
- Phrase: 1
As is our customized for this listing, CVEs that apply to multiple product household are counted as soon as for every household they have an effect on.
Determine 2: Six of the ten product households coated on this month’s updates have only one patch apiece. Muzic is a music-generation challenge on Github (https://github.com/microsoft/muzic) initially developed by a staff from Microsoft Analysis Asia
Notable December updates
Along with the problems mentioned above, various particular gadgets advantage consideration.
CVE-2024-49112 — Home windows Light-weight Listing Entry Protocol (LDAP) Distant Code Execution Vulnerability
The one CVE this month with a CVSS base rating over 9.0, this Crucial-severity RCE weighs in at 9.8/10 and impacts not solely all supported variations of Home windows 10 and 11, however all variations of Server stretching again to 2008. Complexity is low (it requires a maliciously crafted set of LDAP calls), it requires neither privileges nor consumer interplay, and the attacker in a position to efficiently exploit the bug positive factors the power to execute arbitrary code throughout the context of the LDAP service. For directors unable to prioritize this patch for no matter motive, Microsoft advises them to make sure that area controllers will not be configured to entry the web, and that inbound RPC from untrusted networks is disallowed.
CVE-2024-49138 — Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability
The one December CVE that’s identified to be underneath lively exploit within the wild, this Vital-severity elevation of privilege situation likewise impacts all supported shopper and server variations of Home windows. A profitable attacker would acquire system privileges.
CVE-2024-49117 – Home windows Hyper-V Distant Code Execution Vulnerability
An attacker efficiently using this Crucial-severity RCE might probably execute a cross-VM assault, leaping out of the initially compromised machine to compromise others.
CVE-2024-49114 — Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability
This Vital-severity situation is a captivating instance of what simply is likely to be a brand new class of vulnerability: False File Immutability, through which sure assumptions constructed into sure Home windows componentry might result in untrustworthy recordsdata, dangerous system behaviors, or different vulnerabilities. Nonetheless, Microsoft categorizes this CVE as an Elevation of Privilege situation, yet one more prone to be exploited throughout the subsequent 30 days.
12 CVEs – RDP points
As coated in our Energetic Adversary technical stories, RDP continues to be the Microsoft part most frequently abused by attackers. Each client-side and server-side installations are in for it this month, with 10 of those CVEs classed as Crucial-severity by Microsoft.
Determine 3: And as 2024 concludes, Distant Code Execution vulnerabilities retain their standing as the commonest bug species to be squashed, retaining the title seized from Elevation of Privilege on the finish of 2023
Although it began off with three comparatively mild months, 2024 ends with 1015 CVEs addressed by means of the Patch Tuesday course of – the best annual depend since 2020’s complete of 1245 patches. 2024 additionally included the 2 single highest one-month patch counts, in April (147) and July (138). For these curious, December 2023 had the bottom depend of the previous 5 years, with 33 patches.
Determine 4: If it felt like 2020 was a loopy 12 months for Microsoft patches, you’re not improper. Although 2024 had a number of banner months, 2020 was general the heaviest patch load in 4 years for many directors
Sophos protections
CVE | Sophos Intercept X/Endpoint IPS | Sophos XGS Firewall |
CVE-2024-49088 | Exp/2449088-A | Exp/2449088-A |
CVE-2024-49090 | Exp/2449090-A | Exp/2449090-A |
CVE-2024-49093 | Exp/2449093-A | Exp/2449093-A |
CVE-2024-49122 | sid:2310400 | sid:2310400 |
CVE-2024-49138 | Exp/2449138-A | Exp/2449138-A |
As you’ll be able to each month, if you happen to don’t wish to wait to your system to drag down Microsoft’s updates itself, you’ll be able to obtain them manually from the Home windows Replace Catalog web site. Run the winver.exe device to find out which construct of Home windows 10 or 11 you’re working, then obtain the Cumulative Replace bundle to your particular system’s structure and construct quantity.
Appendix A: Vulnerability Affect and Severity
This can be a listing of December patches sorted by affect, then sub-sorted by severity. Every listing is additional organized by CVE.
Distant Code Execution (31 CVEs)
Crucial severity | |
CVE-2024-49105 | Distant Desktop Shopper Distant Code Execution Vulnerability |
CVE-2024-49106 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49108 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49112 | Home windows Light-weight Listing Entry Protocol (LDAP) Distant Code Execution Vulnerability |
CVE-2024-49115 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49116 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49117 | Home windows Hyper-V Distant Code Execution Vulnerability |
CVE-2024-49118 | Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability |
CVE-2024-49119 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49120 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49122 | Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability |
CVE-2024-49123 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49124 | Light-weight Listing Entry Protocol (LDAP) Shopper Distant Code Execution Vulnerability |
CVE-2024-49126 | Home windows Native Safety Authority Subsystem Service (LSASS) Distant Code Execution Vulnerability |
CVE-2024-49127 | Home windows Light-weight Listing Entry Protocol (LDAP) Distant Code Execution Vulnerability |
CVE-2024-49128 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49132 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
Vital severity | |
CVE-2024-49063 | Microsoft/Muzic Distant Code Execution Vulnerability |
CVE-2024-49065 | Microsoft Workplace Distant Code Execution Vulnerability |
CVE-2024-49069 | Microsoft Excel Distant Code Execution Vulnerability |
CVE-2024-49070 | Microsoft SharePoint Distant Code Execution Vulnerability |
CVE-2024-49079 | Enter Technique Editor (IME) Distant Code Execution Vulnerability |
CVE-2024-49080 | Home windows IP Routing Administration Snapin Distant Code Execution Vulnerability |
CVE-2024-49085 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49086 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49089 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49091 | Home windows Area Identify Service Distant Code Execution Vulnerability |
CVE-2024-49102 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49104 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49125 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49142 | Microsoft Entry Distant Code Execution Vulnerability |
CVE-2024-49063 | Microsoft/Muzic Distant Code Execution Vulnerability |
CVE-2024-49065 | Microsoft Workplace Distant Code Execution Vulnerability |
CVE-2024-49069 | Microsoft Excel Distant Code Execution Vulnerability |
Elevation of Privilege (27 CVEs)
Vital severity | |
CVE-2024-43594 | System Heart Operations Supervisor Elevation of Privilege Vulnerability |
CVE-2024-43600 | Microsoft Workplace Elevation of Privilege Vulnerability |
CVE-2024-49059 | Microsoft Workplace Elevation of Privilege Vulnerability |
CVE-2024-49068 | Microsoft SharePoint Elevation of Privilege Vulnerability |
CVE-2024-49072 | Home windows Process Scheduler Elevation of Privilege Vulnerability |
CVE-2024-49073 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49074 | Home windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
CVE-2024-49076 | Home windows Virtualization-Based mostly Safety (VBS) Enclave Elevation of Privilege Vulnerability |
CVE-2024-49077 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49078 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49081 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49083 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49084 | Home windows Kernel Elevation of Privilege Vulnerability |
CVE-2024-49088 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
CVE-2024-49090 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
CVE-2024-49092 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49093 | Home windows Resilient File System (ReFS) Elevation of Privilege Vulnerability |
CVE-2024-49094 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49095 | Home windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
CVE-2024-49097 | Home windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
CVE-2024-49101 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49107 | WmsRepair Service Elevation of Privilege Vulnerability |
CVE-2024-49109 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49110 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49111 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49114 | Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability |
CVE-2024-49138 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
Info Disclosure (7 CVEs)
Vital severity | |
CVE-2024-49062 | Microsoft SharePoint Info Disclosure Vulnerability |
CVE-2024-49064 | Microsoft SharePoint Info Disclosure Vulnerability |
CVE-2024-49082 | Home windows File Explorer Info Disclosure Vulnerability |
CVE-2024-49087 | Home windows Cellular Broadband Driver Info Disclosure Vulnerability |
CVE-2024-49098 | Home windows Wi-fi Huge Space Community Service (WwanSvc) Info Disclosure Vulnerability |
CVE-2024-49099 | Home windows Wi-fi Huge Space Community Service (WwanSvc) Info Disclosure Vulnerability |
CVE-2024-49103 | Home windows Wi-fi Huge Space Community Service (WwanSvc) Info Disclosure Vulnerability |
Denial of Service (5 CVEs)
Vital severity | |
CVE-2024-49075 | Home windows Distant Desktop Companies Denial of Service Vulnerability |
CVE-2024-49096 | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability |
CVE-2024-49113 | Home windows Light-weight Listing Entry Protocol (LDAP) Denial of Service Vulnerability |
CVE-2024-49121 | Home windows Light-weight Listing Entry Protocol (LDAP) Denial of Service Vulnerability |
CVE-2024-49129 | Home windows Distant Desktop Gateway (RD Gateway) Denial of Service Vulnerability |
Spoofing (1 CVE)
Vital severity | |
CVE-2024-49057 | Microsoft Defender for Endpoint on Android Spoofing Vulnerability |
Appendix B: Exploitability
This can be a listing of the December CVEs judged by Microsoft to be both underneath exploitation within the wild or extra prone to be exploited within the wild throughout the first 30 days post-release. The listing is organized by CVE.
Exploitation detected | |
CVE-2024-49138 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
Exploitation extra doubtless throughout the subsequent 30 days | |
CVE-2024-49070 | Microsoft SharePoint Distant Code Execution Vulnerability |
CVE-2024-49088 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
CVE-2024-49090 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
CVE-2024-49093 | Home windows Resilient File System (ReFS) Elevation of Privilege Vulnerability |
CVE-2024-49114 | Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability |
CVE-2024-49122 | Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability |
Appendix C: Merchandise Affected
This can be a listing of December’s patches sorted by product household, then sub-sorted by severity. Every listing is additional organized by CVE. Patches which might be shared amongst a number of product households are listed a number of occasions, as soon as for every product household. Points affecting Home windows Server are additional sorted in Appendix E.
Home windows (59 CVEs)
Crucial severity | |
CVE-2024-49105 | Distant Desktop Shopper Distant Code Execution Vulnerability |
CVE-2024-49106 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49108 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49112 | Home windows Light-weight Listing Entry Protocol (LDAP) Distant Code Execution Vulnerability |
CVE-2024-49115 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49116 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49117 | Home windows Hyper-V Distant Code Execution Vulnerability |
CVE-2024-49118 | Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability |
CVE-2024-49119 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49120 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49122 | Microsoft Message Queuing (MSMQ) Distant Code Execution Vulnerability |
CVE-2024-49123 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49124 | Light-weight Listing Entry Protocol (LDAP) Shopper Distant Code Execution Vulnerability |
CVE-2024-49126 | Home windows Native Safety Authority Subsystem Service (LSASS) Distant Code Execution Vulnerability |
CVE-2024-49127 | Home windows Light-weight Listing Entry Protocol (LDAP) Distant Code Execution Vulnerability |
CVE-2024-49128 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
CVE-2024-49132 | Home windows Distant Desktop Companies Distant Code Execution Vulnerability |
Vital severity | |
CVE-2024-49072 | Home windows Process Scheduler Elevation of Privilege Vulnerability |
CVE-2024-49073 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49074 | Home windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
CVE-2024-49075 | Home windows Distant Desktop Companies Denial of Service Vulnerability |
CVE-2024-49076 | Home windows Virtualization-Based mostly Safety (VBS) Enclave Elevation of Privilege Vulnerability |
CVE-2024-49077 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49078 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49079 | Enter Technique Editor (IME) Distant Code Execution Vulnerability |
CVE-2024-49080 | Home windows IP Routing Administration Snapin Distant Code Execution Vulnerability |
CVE-2024-49081 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49082 | Home windows File Explorer Info Disclosure Vulnerability |
CVE-2024-49083 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49084 | Home windows Kernel Elevation of Privilege Vulnerability |
CVE-2024-49085 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49086 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49087 | Home windows Cellular Broadband Driver Info Disclosure Vulnerability |
CVE-2024-49088 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
CVE-2024-49089 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49090 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
CVE-2024-49091 | Home windows Area Identify Service Distant Code Execution Vulnerability |
CVE-2024-49092 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49093 | Home windows Resilient File System (ReFS) Elevation of Privilege Vulnerability |
CVE-2024-49094 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49095 | Home windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
CVE-2024-49096 | Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability |
CVE-2024-49097 | Home windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability |
CVE-2024-49098 | Home windows Wi-fi Huge Space Community Service (WwanSvc) Info Disclosure Vulnerability |
CVE-2024-49099 | Home windows Wi-fi Huge Space Community Service (WwanSvc) Info Disclosure Vulnerability |
CVE-2024-49101 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49102 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49103 | Home windows Wi-fi Huge Space Community Service (WwanSvc) Info Disclosure Vulnerability |
CVE-2024-49104 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49107 | WmsRepair Service Elevation of Privilege Vulnerability |
CVE-2024-49109 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49110 | Home windows Cellular Broadband Driver Elevation of Privilege Vulnerability |
CVE-2024-49111 | Wi-fi Huge Space Community Service (WwanSvc) Elevation of Privilege Vulnerability |
CVE-2024-49113 | Home windows Light-weight Listing Entry Protocol (LDAP) Denial of Service Vulnerability |
CVE-2024-49114 | Home windows Cloud Information Mini Filter Driver Elevation of Privilege Vulnerability |
CVE-2024-49121 | Home windows Light-weight Listing Entry Protocol (LDAP) Denial of Service Vulnerability |
CVE-2024-49125 | Home windows Routing and Distant Entry Service (RRAS) Distant Code Execution Vulnerability |
CVE-2024-49129 | Home windows Distant Desktop Gateway (RD Gateway) Denial of Service Vulnerability |
CVE-2024-49138 | Home windows Widespread Log File System Driver Elevation of Privilege Vulnerability |
Workplace (5 CVEs)
Vital severity | |
CVE-2024-43600 | Microsoft Workplace Elevation of Privilege Vulnerability |
CVE-2024-49059 | Microsoft Workplace Elevation of Privilege Vulnerability |
CVE-2024-49065 | Microsoft Workplace Distant Code Execution Vulnerability |
CVE-2024-49069 | Microsoft Excel Distant Code Execution Vulnerability |
CVE-2024-49142 | Microsoft Entry Distant Code Execution Vulnerability |
SharePoint (5 CVEs)
Vital severity | |
CVE-2024-49062 | Microsoft SharePoint Info Disclosure Vulnerability |
CVE-2024-49064 | Microsoft SharePoint Info Disclosure Vulnerability |
CVE-2024-49065 | Microsoft Workplace Distant Code Execution Vulnerability |
CVE-2024-49068 | Microsoft SharePoint Elevation of Privilege Vulnerability |
CVE-2024-49070 | Microsoft SharePoint Distant Code Execution Vulnerability |
365 (4 CVEs)
Vital severity | |
CVE-2024-49059 | Microsoft Workplace Elevation of Privilege Vulnerability |
CVE-2024-49065 | Microsoft Workplace Distant Code Execution Vulnerability |
CVE-2024-49069 | Microsoft Excel Distant Code Execution Vulnerability |
CVE-2024-49142 | Microsoft Entry Distant Code Execution Vulnerability |
Entry (1 CVE)
Vital severity | |
CVE-2024-49142 | Microsoft Entry Distant Code Execution Vulnerability |
Defender (1 CVE)
Vital severity | |
CVE-2024-49057 | Microsoft Defender for Endpoint on Android Spoofing Vulnerability |
Excel (1 CVE)
Vital severity | |
CVE-2024-49069 | Microsoft Excel Distant Code Execution Vulnerability |
Muzic (1 CVE)
Vital severity | |
CVE-2024-49063 | Microsoft/Muzic Distant Code Execution Vulnerability |
SCOM (1 CVE)
Vital severity | |
CVE-2024-43594 | System Heart Operations Supervisor Elevation of Privilege Vulnerability |
Phrase (1 CVE)
Vital severity | |
CVE-2024-49065 | Microsoft Workplace Distant Code Execution Vulnerability |
Appendix D: Advisories and Different Merchandise
This can be a listing of advisories and knowledge on different related CVEs within the December launch.
Microsoft data:
CVE / identifier | Product | Title |
ADV240002 | Undertaking 2016 | Microsoft Workplace Protection in Depth Replace |
CVE-2024-12053 | Edge | Chromium: CVE-2024-12053 Kind Confusion in V8 |
CVE-2024-49041 | Edge | Microsoft Edge (Chromium-based) Spoofing Vulnerability |
Adobe Reader advisories:
CVE | Bulletin | Title |
CVE-2024-49531 | APSB24-92 | NULL Pointer Dereference (CWE-476) |
CVE-2024-49530 | APSB24-92 | Use After Free (CWE-416) |
CVE-2024-49532 | APSB24-92 | Out-of-bounds Learn (CWE-125) |
CVE-2024-49533 | APSB24-92 | Out-of-bounds Learn (CWE-125) |
CVE-2024-49534 | APSB24-92 | Out-of-bounds Learn (CWE-125) |
CVE-2024-49535 | APSB24-92 | Improper Restriction of XML Exterior Entity Reference (‘XXE’) (CWE-611) |
Appendix E: Affected Home windows Server variations
This can be a desk of CVEs within the December launch affecting 9 Home windows Server variations — 2008 by means of 2025. The desk differentiates amongst main variations of the platform however doesn’t go into deeper element (eg., Server Core). Crucial-severity points are marked in crimson; an “x” signifies that the CVE doesn’t apply to that model. Directors are inspired to make use of this appendix as a place to begin to establish their particular publicity as every reader’s scenario, particularly because it considerations merchandise out of mainstream assist, will differ.
2008 | 2008-R2 | 2012 | 2012-R2 | 2016 | 2019 | 2022 | 2022 23H2 | 2025 | |
CVE-2024-49072 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49073 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49074 | × | × | × | × | × | ■ | × | × | × |
CVE-2024-49075 | × | × | × | × | × | ■ | ■ | ■ | ■ |
CVE-2024-49076 | × | × | × | × | × | ■ | ■ | ■ | ■ |
CVE-2024-49077 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49078 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49079 | × | × | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49080 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49081 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49082 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49083 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49084 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49085 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49086 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49087 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49088 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49089 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49090 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49091 | × | × | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49092 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49093 | × | × | × | × | × | × | × | × | ■ |
CVE-2024-49094 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49095 | × | × | × | × | × | ■ | ■ | ■ | ■ |
CVE-2024-49096 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49097 | × | × | × | × | × | ■ | ■ | ■ | ■ |
CVE-2024-49098 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49099 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49101 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49102 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49103 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49104 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49105 | × | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49106 | × | × | × | × | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49107 | × | × | × | × | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49108 | × | × | × | × | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49109 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49110 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49111 | × | × | × | × | × | ■ | × | ■ | ■ |
CVE-2024-49112 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49113 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49114 | × | × | × | × | × | ■ | ■ | ■ | ■ |
CVE-2024-49115 | × | × | × | × | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49116 | × | × | × | × | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49117 | × | × | × | × | × | × | ■ | ■ | ■ |
CVE-2024-49118 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49119 | × | × | × | × | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49120 | × | × | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49121 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49122 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49123 | × | × | × | × | × | ■ | ■ | ■ | ■ |
CVE-2024-49124 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49125 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49126 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49127 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49128 | × | × | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49129 | × | × | ■ | ■ | ■ | ■ | ■ | ■ | ■ |
CVE-2024-49132 | × | × | × | × | × | ■ | ■ | ■ | ■ |
CVE-2024-49138 | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ | ■ |