National Cyber Warfare Foundation (NCWF) Forums


Patch Tuesday - March 2024


0 user ratings
2024-03-12 19:48:27
milo
Red Team (CNA)

 - archive -- 

Microsoft is addressing 60 vulnerabilities this March 2024 Patch Tuesday. Microsoft indicated that they aren’t aware of prior public disclosure or exploitation in the wild for any of the vulnerabilities patched today, which means no new additions to CISA KEV at time of writing. Microsoft is patching a single



Microsoft is addressing 60 vulnerabilities this March 2024 Patch Tuesday. Microsoft indicated that they aren’t aware of prior public disclosure or exploitation in the wild for any of the vulnerabilities patched today, which means no new additions to CISA KEV at time of writing. Microsoft is patching a single critical remote code execution (RCE) in Windows, which could allow virtual machine escape from a Hyper-V guest. Four browser vulnerabilities were published separately this month, and are not included in the total.

Windows Hyper-V: critical RCE VM escape

Attackers hoping to escape from a Hyper-V guest virtual machine (VM) and achieve RCE on the Hyper-V host will be interested in CVE-2024-21407. Microsoft describes attack complexity as high: an attacker must first gather information specific to the environment and carry out unspecified preparatory work. Exploitation is via specially crafted file operation requests on the VM to hardware resources on the VM. Every supported version of Windows receives a patch. The advisory describes that no privileges are required for exploitation of the Hyper-V host, although an attacker will presumably need an existing foothold on a guest VM.

Exchange: RCE

A single Exchange vulnerability receives a patch this month. Microsoft describes CVE-2024-26198 as a RCE vulnerability for Exchange, where an attacker places a specially-crafted DLL file into a network share or other file-sharing resource, and convinces the user to open it. Although the FAQ on the advisory asks: “What is the target context of the remote code execution?”, the answer boils down to ”[exploitation] results in loading a malicious DLL”. Since the context of the user opening the malicious file is not specified — an Exchange admin? a user running a mail client connecting to Exchange? something else altogether? — it remains unclear what an attacker might be able to achieve.

It remains vitally important to patch any on-premises instances of Exchange, a perennial attacker favourite. Exchange 2016 admins who were dismayed by the lack of patch for last month’s CVE-2024-21410 may feel somewhat reassured that Microsoft has issued a patch which claims to fully remediate this month’s CVE-2024-26198, but in the absence of any explicit advice to the contrary, a fully-patched Exchange 2016 remains unprotected against CVE-2024-21410 unless the guidance on that advisory is followed.

SharePoint: arbitrary code execution

SharePoint receives a patch for CVE-2024-21426, which Microsoft describes as RCE via the attacker convincing a user to open a malicious file. Although the context of code execution isn’t stated in the advisory, exploitation is local to the user, and could lead to a total loss of confidentiality, integrity, and availability, including downtime for the affected environment.

Azure Kubernetes Service Confidential Containers: confidentiality impact

Azure Kubernetes admins should take note of CVE-2024-21400, which allows an unauthenticated attacker to take over confidential guests and containers, with other outcomes including credential theft and resource impact beyond the scope managed by the Azure Kubernetes Service Confidential Containers (AKSCC). Microsoft describes AKSCC as providing a set of features and capabilities to further secure standard container workloads when working with sensitive data such as PII. The advisory describes additional steps for remediation beyond merely patching AKSCC, including upgrading to the latest version of the az confcom Azure CLI confidential computing extension and Kata Image.

Windows 11: compressed folder tampering

Defenders responsible for Windows 11 assets can protect assets against exploitation of CVE-2024-26185, which Microsoft describes as a compressed folder tampering vulnerability. The advisory is sparse on detail, so while we know that an attacker must convince the user to open a specially crafted file, it’s not clear what the outcome of successful exploitation might be. Since the only impact appears to be to integrity, it’s possible that an attacker could modify a compressed folder but not necessarily read from it. Microsoft expects that exploitation is more likely.

Windows Print Spooler: elevation to SYSTEM

Another site of “exploitation more likely” vulnerabilities this month: the Windows Print Spooler service. A local attacker who successfully exploits CVE-2024-21433 via winning a race condition could elevate themselves to SYSTEM privileges.

Exploitation in the wild: status updates

In the days following February 2024 Patch Tuesday, Microsoft announced several updates where the known exploited status of more than one vulnerability changed, as noted by Rapid7. It remains to be seen if those changes were exceptional or the start of a pattern.

Microsoft products lifecycle review

There are no significant changes to the lifecycle phase of Microsoft products this month.

Summary Charts

A bar chart showing the distribution of vulnerabilities by affected component for Microsoft Patch Tuesday March 2024.
Windows Kernel: get the popcorn
A bar chart showing the distribution of vulnerabilities by impact type for Microsoft Patch Tuesday March 2024.
A comparatively rare outing for Tampering, and a somewhat unusual second place for RCE.
A heatmap showing the distribution of vulnerabilities by impact and affected component for Microsoft Patch Tuesday March 2024.
Similar to last month: a significant round of WDAC patches, but this time current versions of Windows get a patch too.

Summary Tables

Apps vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21411Skype for Consumer Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-26204Outlook for Android Information Disclosure VulnerabilityNoNo7.5
CVE-2024-21390Microsoft Authenticator Elevation of Privilege VulnerabilityNoNo7.1
CVE-2024-26201Microsoft Intune Linux Agent Elevation of Privilege VulnerabilityNoNo6.6

Azure vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21400Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege VulnerabilityNoNo9
CVE-2024-21418Software for Open Networking in the Cloud (SONiC) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21421Azure SDK Spoofing VulnerabilityNoNo7.5
CVE-2024-26203Azure Data Studio Elevation of Privilege VulnerabilityNoNo7.3

Azure System Center vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21334Open Management Infrastructure (OMI) Remote Code Execution VulnerabilityNoNo9.8
CVE-2024-21330Open Management Infrastructure (OMI) Elevation of Privilege VulnerabilityNoNo7.8

Browser vulnerabilities










































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-26167Microsoft Edge for Android Spoofing VulnerabilityNoNo4.3
CVE-2024-2176Chromium: CVE-2024-2176 Use after free in FedCMNoNoN/A
CVE-2024-2174Chromium: CVE-2024-2174 Inappropriate implementation in V8NoNoN/A
CVE-2024-2173Chromium: CVE-2024-2173 Out of bounds memory access in V8NoNoN/A

Developer Tools vulnerabilities




























CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-26165Visual Studio Code Elevation of Privilege VulnerabilityNoNo8.8
CVE-2024-21392.NET and Visual Studio Denial of Service VulnerabilityNoNo7.5

Developer Tools Windows vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-26190Microsoft QUIC Denial of Service VulnerabilityNoNo7.5

ESU Windows vulnerabilities


















































































































































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21441Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21444Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21450Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-26161Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-26166Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21451Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-26159Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21440Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-26162Microsoft ODBC Driver Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21407Windows Hyper-V Remote Code Execution VulnerabilityNoNo8.1
CVE-2024-26173Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-26176Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-26178Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21436Windows Installer Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21437Windows Graphics Component Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-26169Windows Error Reporting Service Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21446NTFS Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21427Windows Kerberos Security Feature Bypass VulnerabilityNoNo7.5
CVE-2024-21432Windows Update Stack Elevation of Privilege VulnerabilityNoNo7
CVE-2024-21439Windows Telephony Server Elevation of Privilege VulnerabilityNoNo7
CVE-2024-21433Windows Print Spooler Elevation of Privilege VulnerabilityNoNo7
CVE-2024-21429Windows USB Hub Driver Remote Code Execution VulnerabilityNoNo6.8
CVE-2024-26197Windows Standards-Based Storage Management Service Denial of Service VulnerabilityNoNo6.5
CVE-2024-21430Windows USB Attached SCSI (UAS) Protocol Remote Code Execution VulnerabilityNoNo5.7
CVE-2024-26174Windows Kernel Information Disclosure VulnerabilityNoNo5.5
CVE-2024-26177Windows Kernel Information Disclosure VulnerabilityNoNo5.5
CVE-2024-26181Windows Kernel Denial of Service VulnerabilityNoNo5.5
CVE-2023-28746Intel: CVE-2023-28746 Register File Data Sampling (RFDS)NoNoN/A

Exchange Server vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-26198Microsoft Exchange Server Remote Code Execution VulnerabilityNoNo8.8

Microsoft Dynamics vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21419Microsoft Dynamics 365 (on-premises) Cross-site Scripting VulnerabilityNoNo7.6

Microsoft Office vulnerabilities



































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21426Microsoft SharePoint Server Remote Code Execution VulnerabilityNoNo7.8
CVE-2024-26199Microsoft Office Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21448Microsoft Teams for Android Information Disclosure VulnerabilityNoNo5

SQL Server vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-26164Microsoft Django Backend for SQL Server Remote Code Execution VulnerabilityNoNo8.8

System Center vulnerabilities





















CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-20671Microsoft Defender Security Feature Bypass VulnerabilityNoNo5.5

Windows vulnerabilities


































































































CVETitleExploited?Publicly disclosed?CVSSv3 base score
CVE-2024-21435Windows OLE Remote Code Execution VulnerabilityNoNo8.8
CVE-2024-21442Windows USB Print Driver Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-26182Windows Kernel Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-26170Windows Composite Image File System (CimFS) Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21434Microsoft Windows SCSI Class System File Elevation of Privilege VulnerabilityNoNo7.8
CVE-2024-21431Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass VulnerabilityNoNo7.8
CVE-2024-21438Microsoft AllJoyn API Denial of Service VulnerabilityNoNo7.5
CVE-2024-21443Windows Kernel Elevation of Privilege VulnerabilityNoNo7.3
CVE-2024-21445Windows USB Print Driver Elevation of Privilege VulnerabilityNoNo7
CVE-2024-26185Windows Compressed Folder Tampering VulnerabilityNoNo6.5
CVE-2024-21408Windows Hyper-V Denial of Service VulnerabilityNoNo5.5
CVE-2024-26160Windows Cloud Files Mini Filter Driver Information Disclosure VulnerabilityNoNo5.5



Source: Rapid7
Source Link: https://blog.rapid7.com/2024/03/12/patch-tuesday-march-2024/


Comments
new comment
Nobody has commented yet. Will you be the first?
 
Forum
Red Team (CNA)



Copyright 2012 through 2024 - National Cyber Warfare Foundation - All rights reserved worldwide.