National Cyber Warfare Foundation (NCWF) Forums


Patch Tuesday - May 2024


0 user ratings
2024-06-09 20:02:53
milo
Red Team (CNA)

 - archive -- 
Zero-days in DWM, MSHTML, and Visual Studio. SharePoint critical post-auth RCE. Remote Access repatch. Mobile Broadband USB vulns.

Patch Tuesday - May 2024

Microsoft is addressing 61 vulnerabilities this May 2024 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation and/or public disclosure for three of the vulnerabilities published today. At time of writing, two of the vulnerabilities patched today are listed on CISA KEV. Microsoft is also patching a single critical remote code execution (RCE) vulnerability today. Six browser vulnerabilities were published separately this month, and are not included in the total.

Windows DWM: zero-day EoP

The first of today’s zero-day vulnerabilities is CVE-2024-30051, an elevation of privilege (EoP) vulnerability in the Windows Desktop Windows Manager (DWM) Core Library which is listed on the CISA KEV list. Successful exploitation grants SYSTEM privileges. First introduced as part of Windows Vista, DWM is responsible for drawing everything on the display of a Windows system.

Reporters Securelist have linked exploitation of CVE-2024-30051 with deployment of QakBot malware, and the vulnerability while investigating a partial proof-of-concept contained within an unusual file originally submitted to VirusTotal by an unknown party. Securelist further notes that the exploitation method for CVE-2024-30051 is identical to a previous DWM zero-day vulnerability CVE-2023-36033, which Microsoft patched back in November 2023.

Courtesy of Microsoft’s recent enhancement of their security advisories to include Common Weakness Enumeration (CWE) data, the mechanism of exploitation is listed as CVE-122: Heap-based Buffer Overflow, which is just the sort of defect which recent US federal government calls for memory safe software development are designed to address.

MSHTML: zero-day security feature bypass

The Windows MSHTML platform receives a patch for CVE-2024-30040, a security feature bypass vulnerability for which Microsoft has evidence of exploitation in the wild, and which CISA has also listed on KEV.

The advisory states that an attacker would have to convince a user to open a malicious file; successful exploitation bypasses COM/OLE protections in Microsoft 365 and Microsoft Office to achieve code execution in the context of the user.

As Rapid7 has previously noted, MSHTML (also known as Trident) is still fully present in Windows — and unpatched assets are thus vulnerable to CVE-2024-30040 — regardless of whether or not a Windows asset has Internet Explorer 11 fully disabled.

Visual Studio: zero-day DoS

Rounding out today’s trio of zero-day vulnerabilities: a denial of service (DoS) vulnerability in Visual Studio.

Microsoft describes CVE-2024-30046 as requiring a highly complex attack to win a race condition through “[the investment of] time in repeated exploitation attempts through sending constant or intermittent data”. Since all data sent anywhere is transmitted either constantly or intermittently, and the rest of the advisory is short on detail, the potential impact of exploitation remains unclear.

Only Visual Studio 2022 receives an update, so older supported versions of Visual Studio are presumably unaffected.

SharePoint: critical post-auth RCE

SharePoint admins are no strangers to patches for critical RCE vulnerabilities. CVE-2024-30044 allows an authenticated attacker with Site Owner permissions or higher to achieve code execution in the context of SharePoint Server via upload of a specially crafted file, followed by specific API calls to trigger deserialization of the file’s parameters.

Microsoft considers exploitation of CVE-2024-30044 more likely. The original version of the advisory had the "privileges required" CVSS vector component as low, which was debatable given the Site Owner authentication requirement for exploitation; Microsoft has now updated the advisory so that "privileges required" is now correctly specified as high. Some slight confusion remains in the wording of the advisory FAQ, but the correction to the CVSS vector itself is welcome. The low attack complexity and network attack contribute to a CVSS 3.1 base score of 7.2, which is reduced from the original base score of 8.8 prior to the CVSS vector correction.

Microsoft has previously published an accessible introduction to deserialization vulnerabilities and the risks of assuming data to be trustworthy, aimed at .NET developers.

Excel: arbitrary code execution

Microsoft Excel receives a patch for CVE-2024-30042. Successful exploitation requires that an attacker convince the user to open a malicious file, which leads to code execution, presumably in the context of the user.

Remote Access Connection Manager: last month’s vulns repatched

Also of interest today: Microsoft is releasing updated patches for three Windows Remote Access Connection Manager information disclosure vulnerabilities originally published in April 2024: CVE-2024-26207, CVE-2024-26217, and CVE-2024-28902. Microsoft states that an unspecified regression introduced by the April patches is resolved by installation of the May patches.

Mobile Broadband driver: 11 local USB RCEs

The Windows Mobile Broadband driver receives patches for no fewer than 11 vulnerabilities; for example, CVE-2024-29997. All 11 vulnerabilities appear very similar based on the advisories. In each case, the relatively low CVSS base score of 6.8 reflects that an attacker must be physically present and insert a malicious USB device into the target host.

Third-party open source patches

Back in 2021, Microsoft started publishing the Assigning CNA (CVE Numbering Authority) field on advisories. A welcome trend of publishing advisories for third-party software included in Microsoft products continues this month with two vulnerabilities in MinGit patched as part of the May 2024 Windows security updates. MinGit is published by GitHub and consumed by Visual Studio. CVE-2024-32002 describes a RCE vulnerability on case-insensitive filesystems that support symlinks — macOS APFS comes to mind — and CVE-2024-32004 describes RCE while cloning specially-crafted local repositories.

Lifecycle update

There are no significant changes to the lifecycle phase of Microsoft products this month.

Summary Charts

Patch Tuesday - May 2024
Mobile Broadband is this month's winner, albeit for 11 apparently very similar vulns.
Patch Tuesday - May 2024
RCE: the people's champion.
Patch Tuesday - May 2024
The lesser-spotted Tampering impact type makes an appearance this month.

Summary Tables

Apps vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30059Microsoft Intune for Android Mobile Application Management Tampering VulnerabilityNoNo6.1
CVE-2024-30041Microsoft Bing Search Spoofing VulnerabilityNoNo5.4

Azure vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30053Azure Migrate Cross-Site Scripting VulnerabilityNoNo6.5

Browser vulnerabilities
























































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30055Microsoft Edge (Chromium-based) Spoofing VulnerabilityNoNo5.4
CVE-2024-4671Chromium: CVE-2024-4671 Use after free in VisualsNoNoN/A
CVE-2024-4559Chromium: CVE-2024-4559 Heap buffer overflow in WebAudioNoNoN/A
CVE-2024-4558Chromium: CVE-2024-4558 Use after free in ANGLENoNoN/A
CVE-2024-4368Chromium: CVE-2024-4368 Use after free in DawnNoNoN/A
CVE-2024-4331Chromium: CVE-2024-4331 Use after free in Picture In PictureNoNoN/A

Developer Tools vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-32002CVE-2024-32002 Recursive clones on case-insensitive filesystems that support symlinks are susceptible to Remote Code ExecutionNoNo9
CVE-2024-32004GitHub: CVE-2024-32004 Remote Code Execution while cloning special-crafted local repositoriesNoNo8.1
CVE-2024-30045.NET and Visual Studio Remote Code Execution VulnerabilityNoNo6.3
CVE-2024-30046Visual Studio Denial of Service VulnerabilityNoYes5.9

ESU vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30030Win32k Elevation of Privilege VulnerabilityNoNo7.8

ESU Windows vulnerabilities






















































































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30009Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-30010Windows Hyper-V Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-30006Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-30020Windows Cryptographic Services Remote Code Execution VulnerabilityNoNo8.1
CVE-2024-30049Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-29996Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30025Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30031Windows CNG Key Isolation Service Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30028Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30038Win32k Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30027NTFS Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30014Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-30015Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-30022Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-30023Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-30024Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-30029Windows Routing and Remote Access Service (RRAS) Remote Code Execution VulnerabilityNoNo7.5
CVE-2024-30037Windows Common Log File System Driver Elevation of Privilege VulnerabilityNoNo7.5
CVE-2024-30011Windows Hyper-V Denial of Service VulnerabilityNoNo6.5
CVE-2024-30036Windows Deployment Services Information Disclosure VulnerabilityNoNo6.5
CVE-2024-30019DHCP Server Service Denial of Service VulnerabilityNoNo6.5
CVE-2024-30039Windows Remote Access Connection Manager Information Disclosure VulnerabilityNoNo5.5
CVE-2024-30016Windows Cryptographic Services Information Disclosure VulnerabilityNoNo5.5
CVE-2024-30050Windows Mark of the Web Security Feature Bypass VulnerabilityNoNo5.4

Microsoft Dynamics vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30047Dynamics 365 Customer Insights Spoofing VulnerabilityNoNo7.6
CVE-2024-30048Dynamics 365 Customer Insights Spoofing VulnerabilityNoNo7.6

Microsoft Office vulnerabilities



































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30044Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-30042Microsoft Excel Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-30043Microsoft SharePoint Server Information Disclosure VulnerabilityNoNo6.5

SQL Server vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30054Microsoft Power BI Client JavaScript SDK Information Disclosure VulnerabilityNoNo6.5

Windows vulnerabilities















































































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-30040Windows MSHTML Platform Security Feature Bypass VulnerabilityYesNo8.8
CVE-2024-30017Windows Hyper-V Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-30007Microsoft Brokering File System Elevation of Privilege VulnerabilityNoNo8.8
CVE-2024-30018Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30051Windows DWM Core Library Elevation of Privilege VulnerabilityYesYes7.8
CVE-2024-30032Windows DWM Core Library Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30035Windows DWM Core Library Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-29994Microsoft Windows SCSI Class System File Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-26238Microsoft PLUGScheduler Scheduled Task Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-30033Windows Search Service Elevation of Privilege VulnerabilityNoNo7
CVE-2024-29997Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-29998Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-29999Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30000Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30001Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30002Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30003Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30004Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30005Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30012Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30021Windows Mobile Broadband Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-30008Windows DWM Core Library Information Disclosure VulnerabilityNoNo5.5
CVE-2024-30034Windows Cloud Files Mini Filter Driver Information Disclosure VulnerabilityNoNo5.5

Updates

  • 2024-05-16: Updated SharePoint vulnerability CVE-2024-30044 to reflect Microsoft's correction to the CVSS vector, as suggested by the original version of this blog post.


Source: Rapid7
Source Link: https://blog.rapid7.com/2024/05/14/patch-tuesday-may-2024/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.