Home

Some companies that have chosen us

Privacy Officer and Privacy Consultant
CDP Scheme according to ISO/IEC 17024:2012
European Privacy Auditor
ISDP©10003 Certification Scheme according to ISO/IEC 17065:2012
Auditor
According to standard UNI 11697:2017
Lead Auditor ISO/IEC 27001:2022
According to standard ISO/IEC 17024:2012
Data Protection Officer
According to standard ISO/IEC 17024:2012
Anti-Bribery Lead Auditor Expert
According to standard ISO/IEC 17024:2012
ICT Security Manager
According to standard UNI 11506:2017
IT Service Management (ITSM)
According to the ITIL Foundation
Ethical Hacker (CEH)
According to the EC-Council
Network Defender (CND)
According to the EC-Council
Computer Hacking Forensics Investigator (CHFI)
According to the EC-Council
Penetration Testing Professional (CPENT)
According to the EC-Council

Professional qualifications

Stay up-to-date with world news!

Select your topics of interest:
CYBER ALERT
Home / CYBER ALERT
/
Microsoft Monthly Updates (AL01/240515/CSIRT-ITA) – Update

Microsoft Monthly Updates (AL01/240515/CSIRT-ITA) – Update

Summary

Microsoft released the monthly security updates resolving a total of 61 new vulnerabilities, including three 0-day vulnerabilities.

Notes (updated 07/06/2024): a Proof of Concept (PoC) for the exploitation of the CVE-2024-30043 vulnerability appears to be available online.

Notes: The vendor states that CVE-2024-30040 and CVE-2024-30051 are actively exploited on the network.

Notes: The vendor states that a PoC for the exploitation of CVE-2024-30046 e CVE-2024-30051  is available on the network.

Risk

Estimated impact of the vulnerability on the target community: Serious/RED (77.94/100)1.

Type

  • Information Disclosure
  • Tampering
  • Security Feature Bypass
  • Remote Code Execution
  • Elevation of Privilege
  • Denial of Service
  • Spoofing

Affected Products and Versions

  • .NET and Visual Studio
  • Azure Migrate
  • Microsoft Bing
  • Microsoft Brokering File System
  • Microsoft Dynamics 365 Customer Insights
  • Microsoft Edge (Chromium-based)
  • Microsoft Intune
  • Microsoft Office Excel
  • Microsoft Office SharePoint
  • Microsoft WDAC OLE DB provider for SQL
  • Microsoft Windows SCSI Class System File
  • Microsoft Windows Search Component
  • Power BI
  • Visual Studio
  • Windows Cloud Files Mini Filter Driver
  • Windows CNG Key Isolation Service
  • Windows Common Log File System Driver
  • Windows Cryptographic Services
  • Windows Deployment Services
  • Windows DHCP Server
  • Windows DWM Core Library
  • Windows Hyper-V
  • Windows Kernel
  • Windows Mark of the Web (MOTW)
  • Windows Mobile Broadband
  • Windows MSHTML Platform
  • Windows NTFS
  • Windows Remote Access Connection Manager
  • Windows Routing and Remote Access Service (RRAS)
  • Windows Task Scheduler
  • Windows Win32K – GRFX
  • Windows Win32K – ICOMP

Mitigation Actions

In line with vendor statements, it is recommended that impacted products be updated through the Windows Update feature.

Unique vulnerability identifiers

CVE-ID
CVE-2024-30040CVE-2024-30039CVE-2024-32002CVE-2024-30002
CVE-2024-30037CVE-2024-30044CVE-2024-30059CVE-2024-30054
CVE-2024-30031CVE-2024-30014CVE-2024-30049CVE-2024-30033
CVE-2024-30046CVE-2024-30036CVE-2024-26238CVE-2024-30038
CVE-2024-30047CVE-2024-30051CVE-2024-30019CVE-2024-32004
CVE-2024-30015CVE-2024-30021CVE-2024-30035CVE-2024-29999
CVE-2024-29994CVE-2024-30043CVE-2024-30027CVE-2024-30053
CVE-2024-30028CVE-2024-30022CVE-2024-30001CVE-2024-30024
CVE-2024-30041CVE-2024-30030CVE-2024-30018CVE-2024-30006
CVE-2024-30016CVE-2024-30045CVE-2024-30048CVE-2024-30003
CVE-2024-29998CVE-2024-30010CVE-2024-30007CVE-2024-30008
CVE-2024-30020CVE-2024-30009CVE-2024-30050CVE-2024-30000
CVE-2024-30032CVE-2024-30023CVE-2024-29996CVE-2024-30004
CVE-2024-30017CVE-2024-30025CVE-2024-30029CVE-2024-30034
CVE-2024-30012CVE-2024-30005CVE-2024-29997CVE-2024-30042
CVE-2024-30011

References

https://msrc.microsoft.com/update-guide/releaseNote/2024-May

https://msrc.microsoft.com/update-guide (NB: filter: patch tuesday – May 2024)

1This estimate is made taking into account several parameters, including: CVSS, availability of patches/workarounds and PoCs, spread of the affected software/devices in the relevant community.

Recommended to you

Search in 365TRUST

Our services