martes de parches
Threat Research

September Patch Tuesday addresses 79 CVEs

Seven critical-severity vulnerabilities addressed, including an extraordinary (but narrow) Windows Update flaw

Microsoft on Tuesday released 79 patches touching eleven product families. Seven of those issues, affecting Azure, SharePoint, and Windows, are considered by Microsoft to be of critical severity. At press time, three of the issues addressed are known to be under exploit in the wild, with a fourth issue not itself under exploit, but intertwined with issues that are. (For details on this unusual situation, please see the “Notable September updates” section below.) Microsoft assesses that 11 CVEs, all in Windows, are by the company’s estimation more likely to be exploited in the next 30 days. Eight of this month’s issues are amenable to detection by Sophos protections, and we include information on those in a table below.

In addition to these patches, the release includes advisory information on three CVEs addressed by patches from Adobe, affecting Reader and ColdFusion; one of the Reader vulnerabilities CVE-2024-41869) is a critical-severity use-after-free with a workable exploit already available in the wild. We are as always including at the end of this post additional appendices listing all Microsoft’s patches, sorted by severity, by predicted exploitability, and by product family.

By the numbers

  • Total CVEs: 79
  • Total Adobe advisories covered in update: 3
  • Publicly disclosed: 1
  • Exploited detected: 4*
  • Severity
    • Critical: 7
    • Important: 71
    • Moderate: 1
  • Impact
    • Elevation of privilege: 30
    • Remote code execution: 23
    • Information disclosure: 11
    • Denial of service: 8
    • Security feature bypass: 4
    • Spoofing: 3
  • CVSS base score 9.0 or greater: 2
  • CVSS base score 8.0 or greater: 24

* For information on why we count CVE-2024-43491 as this month’s fourth exploited-detected CVE despite the CVE itself not being detected as under exploit, please see the “Notable September updates” section below.

A bar chart displaying the severity of vulnerabilities addressed in Microsoft's September 2024 patch release. Information is duplicated in the article text.

Figure 1: This month’s critical-severity patches include one for which exploitation has already been detected, and two more for which exploitation is more likely within the next 30 days

Product families

  • Windows: 47
  • SQL Server: 13
  • Azure: 6
  • SharePoint: 5
  • Office: 4
  • 365: 2
  • Dynamics 365: 2
  • Microsoft AutoUpdate (MAU) for Mac: 1
  • Outlook for iOS: 1
  • Power BI: 1
  • Visio: 1

As is our custom for this list, CVEs that apply to more than one product family are counted once for each family they affect.

A bar chart displaying the product families affected by vulnerabilities addressed in Microsoft's September 2024 patch release. Information is duplicated in the article text.

Figure 2: Though Windows as usual leads the list of affected product families, a collection of Native Scoring issues in SQL Server contributed to that product taking 13 patches of its own

Notable September updates

In addition to the issues discussed above, a number of specific items merit attention.

CVE-2024-38217 — Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-43492 — Windows Mark of the Web Security Feature Bypass Vulnerability

There are patches for two Mark of the Web vulnerabilities this month, and both are either currently under active exploit in the wild (CVE-2024-38217) or judged by Microsoft as more likely to be exploited within the next 30 days (CVE-2024-43492). The latter bug was found in-house at Microsoft and is considered to be of moderate severity. The former, however, was disclosed responsibly by Elastic Security’s Joe Desimone, who has posted about the discovery and the reporting process, and which may be of interest to those who follow issues around code-signing certificates. The bug affects all versions of Windows including Win 11H24 and is of important severity.

CVE-2024-38014 — Windows Installer Elevation of Privilege Vulnerability

This issue is under active exploit in the wild. It affects all versions of Windows including Win 11H24.

CVE-2024-43491 – Microsoft Windows Update Remote Code Execution Vulnerability

The good news is that this issue affects only certain operational components of Windows 10, version 1507 (first released in July 2015); only two versions of that build, Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB, are still under support. The bad news, for those still running either of those versions, is that critical-severity remote code execution issue, which carries a 9.8 CVE base score, occurs in… the Windows Servicing Stack. It’s a fascinating issue for those who care about such things — rather than a coding error per se, Microsoft explains that the build version numbers themselves “crossed into a range that triggered a code defect in the Windows 10 (version 1507) servicing stack that handles the applicability of Optional Components. As a result, any Optional Component that was serviced with updates released since March 12, 2024 (KB5035858) was detected as “not applicable” by the servicing stack and was reverted to its RTM version.” If this issue is applicable to your estate, it is recommended that you closely read and follow the information Microsoft provides in KB5043083, as the patch sequence one must follow is precise. That page also includes a list of the specific optional components affected, which may help clarify your exposure.

[29 CVEs] — Windows 11 24H2 patches

Even though Windows 11 24H2 is not yet in general release, just over a third of this month’s patches affect that platform, including two (CVE-2024-38014, CVE-2024-38217) for which exploitation has already been detected in the wild. Users of the new Copilot+ PCs who do not ingest their patches automatically should be sure to update their devices.

[0 CVEs] — .NET, Visual Studio, Edge / Chromium, non-iOS Outlook

A rare month of respite for .NET and Visual Studio, with no patches released for those families. Nor are there any this time around related to Edge, or to Outlook for platforms other than Apple’s.

A bar chart displaying the severity of vulnerabilities addressed in Microsoft's 2024 patch releases so far.

Figure 3: Despite the predominance of EoP issues in recent months, RCE continues to lead the pack as we reach the three-quarter mark for 2024.

Sophos protections

CVE Sophos Intercept X/Endpoint IPS Sophos XGS Firewall
CVE-2024-38237 Exp/2438237-A Exp/2438237-A
CVE-2024-38238 Exp/2438238-A Exp/2438238-A
CVE-2024-38241 Exp/2438241-A Exp/2438241-A
CVE-2024-38242 Exp/2438242-A Exp/2438242-A
CVE-2024-38243 Exp/2438243-A Exp/2438243-A
CVE-2024-38244 Exp/2438244-A Exp/2438244-A
CVE-2024-38245 Exp/2438245-A Exp/2438245-A
CVE-2024-43461 SID:2310127 SID:2310126

 

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows 10 or 11 you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of September patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.

Elevation of Privilege (30 CVEs)

Critical severity
CVE-2024-38194 Azure Web Apps Elevation of Privilege Vulnerability
CVE-2024-38216 Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2024-38220 Azure Stack Hub Elevation of Privilege Vulnerability
Important severity
CVE-2024-37341 Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-37965 Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-37980 Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-38014 Windows Installer Elevation of Privilege Vulnerability
CVE-2024-38046 PowerShell Elevation of Privilege Vulnerability
CVE-2024-38188 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2024-38225 Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2024-38237 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38238 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38239 Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-38240 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-38241 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38242 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38243 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38244 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38245 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38246 Win32k Elevation of Privilege Vulnerability
CVE-2024-38247 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38248 Windows Storage Elevation of Privilege Vulnerability
CVE-2024-38249 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38250 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38252 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-38253 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-43457 Windows Setup and Deployment Elevation of Privilege Vulnerability
CVE-2024-43465 Microsoft Excel Elevation of Privilege Vulnerability
CVE-2024-43470 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2024-43492 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

 

Remote Code Execution (23 CVEs)

Critical severity
CVE-2024-38018 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38119 Windows Network Address Translation (NAT) Remote Code Execution Vulnerability
CVE-2024-43464 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43491 Microsoft Windows Update Remote Code Execution Vulnerability
Important severity
CVE-2024-21416 Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-26186 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-26191 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37335 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37338 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37339 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37340 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-38045 Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-38227 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38228 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38259 Microsoft Management Console Remote Code Execution Vulnerability
CVE-2024-38260 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38263 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43454 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43463 Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-43467 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43469 Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-43479 Microsoft Power Automate Desktop Remote Code Execution Vulnerability
CVE-2024-43495 Windows libarchive Remote Code Execution Vulnerability

 

Information Disclosure (11 CVEs)

Important severity
CVE-2024-37337 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37342 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37966 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-38254 Windows Authentication Information Disclosure Vulnerability
CVE-2024-38256 Windows Kernel-Mode Driver Information Disclosure Vulnerability
CVE-2024-38257 Microsoft AllJoyn API Information Disclosure Vulnerability
CVE-2024-38258 Windows Remote Desktop Licensing Service Information Disclosure Vulnerability
CVE-2024-43458 Windows Networking Information Disclosure Vulnerability
CVE-2024-43474 Microsoft SQL Server Information Disclosure Vulnerability
CVE-2024-43475 Microsoft Windows Admin Center Information Disclosure Vulnerability
CVE-2024-43482 Microsoft Outlook for iOS Information Disclosure Vulnerability

 

Denial of Service (8 CVEs)

Important severity
CVE-2024-38230 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVE-2024-38231 Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVE-2024-38232 Windows Networking Denial of Service Vulnerability
CVE-2024-38233 Windows Networking Denial of Service Vulnerability
CVE-2024-38234 Windows Networking Denial of Service Vulnerability
CVE-2024-38235 Windows Hyper-V Denial of Service Vulnerability
CVE-2024-38236 DHCP Server Service Denial of Service Vulnerability
CVE-2024-43466 Microsoft SharePoint Server Denial of Service Vulnerability

 

Security Feature Bypass (4 CVEs)

Important severity
CVE-2024-30073 Windows Security Zone Mapping Security Feature Bypass Vulnerability
CVE-2024-38217 Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-38226 Microsoft Publisher Security Features Bypass Vulnerability
Moderate severity
CVE-2024-43487 Windows Mark of the Web Security Feature Bypass Vulnerability

 

Spoofing (3 CVEs)

Important severity
CVE-2024-43455 Windows Remote Desktop Licensing Service Spoofing Vulnerability
CVE-2024-43461 Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43476 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 

Appendix B: Exploitability

This is a list of the September CVEs judged by Microsoft to be either under exploitation in the wild or more likely to be exploited in the wild within the first 30 days post-release. The list is arranged by CVE. In the case of CVE-2024-43491, the issue itself is not known to be under active exploit, but certain of the issues fixed by the rejected servicing-stack updates are, so we are choosing to include it on this list. (Please see the “Notable September updates” section above for context.)

Exploitation detected
CVE-2024-38014 Windows Installer Elevation of Privilege Vulnerability
CVE-2024-38217 Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-38226 Microsoft Publisher Security Features Bypass Vulnerability
CVE-2024-43491 Microsoft Windows Update Remote Code Execution Vulnerability
Exploitation more likely within the next 30 days
CVE-2024-38018 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38227 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38228 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38237 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38238 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38241 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38242 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38243 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38244 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38245 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38246 Win32k Elevation of Privilege Vulnerability
CVE-2024-38247 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38249 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38252 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-38253 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-43457 Windows Setup and Deployment Elevation of Privilege Vulnerability
CVE-2024-43461 Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43464 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43487 Windows Mark of the Web Security Feature Bypass Vulnerability

 

Appendix C: Products Affected

This is a list of September’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family.

Windows (47 CVEs)

Critical severity
CVE-2024-38119 Windows Network Address Translation (NAT) Remote Code Execution Vulnerability
CVE-2024-43491 Microsoft Windows Update Remote Code Execution Vulnerability
Important severity
CVE-2024-21416 Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-30073 Windows Security Zone Mapping Security Feature Bypass Vulnerability
CVE-2024-38014 Windows Installer Elevation of Privilege Vulnerability
CVE-2024-38045 Windows TCP/IP Remote Code Execution Vulnerability
CVE-2024-38046 PowerShell Elevation of Privilege Vulnerability
CVE-2024-38217 Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2024-38230 Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVE-2024-38231 Windows Remote Desktop Licensing Service Denial of Service Vulnerability
CVE-2024-38232 Windows Networking Denial of Service Vulnerability
CVE-2024-38233 Windows Networking Denial of Service Vulnerability
CVE-2024-38234 Windows Networking Denial of Service Vulnerability
CVE-2024-38235 Windows Hyper-V Denial of Service Vulnerability
CVE-2024-38236 DHCP Server Service Denial of Service Vulnerability
CVE-2024-38237 Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38238 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38239 Windows Kerberos Elevation of Privilege Vulnerability
CVE-2024-38240 Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-38241 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38242 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38243 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38244 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38245 Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2024-38246 Win32k Elevation of Privilege Vulnerability
CVE-2024-38247 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38248 Windows Storage Elevation of Privilege Vulnerability
CVE-2024-38249 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38252 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-38253 Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-38254 Windows Authentication Information Disclosure Vulnerability
CVE-2024-38256 Windows Kernel-Mode Driver Information Disclosure Vulnerability
CVE-2024-38257 Microsoft AllJoyn API Information Disclosure Vulnerability
CVE-2024-38258 Windows Remote Desktop Licensing Service Information Disclosure Vulnerability
CVE-2024-38259 Microsoft Management Console Remote Code Execution Vulnerability
CVE-2024-38260 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-38263 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43454 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43455 Windows Remote Desktop Licensing Service Spoofing Vulnerability
CVE-2024-43457 Windows Setup and Deployment Elevation of Privilege Vulnerability
CVE-2024-43458 Windows Networking Information Disclosure Vulnerability
CVE-2024-43461 Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43467 Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability
CVE-2024-43475 Microsoft Windows Admin Center Information Disclosure Vulnerability
CVE-2024-43495 Windows libarchive Remote Code Execution Vulnerability
Moderate severity
CVE-2024-43487 Windows Mark of the Web Security Feature Bypass Vulnerability

 

SQL Server (13 CVEs)

Important severity
CVE-2024-26186 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-26191 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37335 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37337 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37338 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37339 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37340 Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
CVE-2024-37341 Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-37342 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37965 Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-37966 Microsoft SQL Server Native Scoring Information Disclosure Vulnerability
CVE-2024-37980 Microsoft SQL Server Elevation of Privilege Vulnerability
CVE-2024-43474 Microsoft SQL Server Information Disclosure Vulnerability

 

Azure (6 CVEs)

Critical severity
CVE-2024-38194 Azure Web Apps Elevation of Privilege Vulnerability
CVE-2024-38216 Azure Stack Hub Elevation of Privilege Vulnerability
CVE-2024-38220 Azure Stack Hub Elevation of Privilege Vulnerability
Important severity
CVE-2024-38188 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability
CVE-2024-43469 Azure CycleCloud Remote Code Execution Vulnerability
CVE-2024-43470 Azure Network Watcher VM Agent Elevation of Privilege Vulnerability

 

SharePoint (5 CVEs)

Critical severity
CVE-2024-38018 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43464 Microsoft SharePoint Server Remote Code Execution Vulnerability
Important severity
CVE-2024-38227 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-38228 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-43466 Microsoft SharePoint Server Denial of Service Vulnerability

 

Office (4 CVE)

Important severity
CVE-2024-38226 Microsoft Publisher Security Features Bypass Vulnerability
CVE-2024-38250 Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-43463 Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-43465 Microsoft Excel Elevation of Privilege Vulnerability

 

365 (2 CVE)

Important severity
CVE-2024-43463 Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-43465 Microsoft Excel Elevation of Privilege Vulnerability

 

Dynamics 365 (2 CVE)

Important severity
CVE-2024-38225 Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2024-43476 Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability

 

Microsoft AutoUpdate (MAU) for Mac (1 CVE)

Important severity
CVE-2024-43492 Microsoft AutoUpdate (MAU) Elevation of Privilege Vulnerability

 

Outlook for iOS (1 CVE)

Important severity
CVE-2024-43482 Microsoft Outlook for iOS Information Disclosure Vulnerability

 

PowerBI (1 CVE)

Important severity
CVE-2024-43479 Microsoft Power Automate Desktop Remote Code Execution Vulnerability

 

Visio (1 CVE)

Important severity
CVE-2024-43463 Microsoft Office Visio Remote Code Execution Vulnerability

 

Appendix D: Advisories and Other Products

This is a list of advisories and information on other relevant CVEs in the September release, sorted by product.

Relevant to Adobe (non-Microsoft release) (3 CVEs)

CVE-2024-41869 APSB24-70 Use After Free (CWE-416)
CVE-2024-41874 APSB24-71 Deserialization of Untrusted Data (CWE-502)
CVE-2024-39420 APSB24-70 Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367)

 

 

Leave a Reply

Your email address will not be published. Required fields are marked *