Patch Tuesday June 2024 Patch Tuesday June 2024

June 11, 2024

What Are We Patching This Tuesday?

In this Patch Tuesday edition, Microsoft addressed 49 CVEs across its entire portfolio of products. One was marked Critical and 48 Important. No zero-days and none of them exploited in the wild. If we include the third-party CVEs documented by Microsoft, the total CVE count rises to 51.

Microsoft addressed 49 CVEs across its entire portfolio of products. One was marked Critical and 48 Important

Patches cover components from Windows, Office, Visual Studio, Dynamics, Azure, Edge, SharePoint, SQL, OS Drivers, File System and Storage Services, and Container Services.

From an Impact perspective, Escalation of Privilege (EoP) vulnerabilities accounted for 49%, followed by Remote Code Execution (RCE) at 37% and Denial of Service (DOS) at 8%.

Impact perspective - Patch Tuesday - June 2024

A closer look at the most interesting CVEs of this month:

CVE-2024-30080

CVE-2024-30080 is a Remote Code Execution RCE vulnerability in Microsoft Message Queuing MSMQ, which is an OS component that enables applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline. Although MSMQ was discontinued by Microsoft in 2019, and replaced by more modern architectures like Kafka, it’s still being used in Windows 7 / 8 / 10, Server 2008 / 2012.

This CVE has a CVSS score of 9.8 and is rated by Microsoft as Critical. To be able to exploit it, a threat actor may send crafted messages to the MSMQ service on TCP 1801, through which may then run server side RCEs.

CVE-2024-30103

CVE-2024-30103 is another Remote Code Execution RCE vulnerability, this time in Microsoft Outlook. It has a CVSS score of 8.8. The attacker must be authenticated with valid Exchange credentials.

By successfully exploiting this vulnerability using Outlook Application Preview Pane as the attack vector, an attacker can create malicious DLL files, bypassing all of Outlook’s security measures.

Morphisec researchers Michael Gorelik and Shmuel Uzan discovered the vulnerability, noting its particular danger for accounts utilizing Microsoft Outlook’s auto-open email feature, as the execution begins upon opening an affected email.

CVE-2024-30078

CVE-2024-30078 is another Remote Code Execution RCE vulnerability, affecting the Windows Wi-Fi driver. It has a CVSS score of 8.8, allowing an unauthenticated attacker to initially exploit the vulnerability by sending specially crafted packets, which can then lead to RCE. It’s important to note that the attacker needs to be in the physical proximity of the target to have Wi-Fi access.

We selected this vulnerability because:

  1. Wi-Fi cards on Windows systems are pretty much everywhere, providing an immense attack surface that can be present in virtually any organization.
  2. Wi-Fi signals can easily overcome the physical perimeter of any organization, which will probably be seen as an interesting and appealing opportunity by many attackers.

CVE-2024-30064, CVE-2024-30068, CVE-2024-30088 & CVE-2024-30099

CVE-2024-30064, CVE-2024-30068, CVE-2024-30088, CVE-2024-30099 are Escalation Of Privilege EOP vulnerabilities affecting Windows Kernel, with CVSS score between 7.0 – 8.8 and rated by Microsoft as Important.

CVE-2024-30064 and CVE-2024-30068 have the higher CVSS score and are both rated as “Exploitation Less Likely”, while the other two CVEs are rated as “Exploitation More Likely”.

By exploiting these vulnerabilities through a low-privilege AppContainer, an attacker could gain SYSTEM privileges, from where he could execute code or access resources. It’s important to note that the attacker needs to first be able to authenticate to the system and be able to execute a specially crafted exploit, which makes the exploit to be less likely.

Full list of CVEs released by Microsoft for June 2024:

# CVE Severity Type CVSS Known Exploit
1 CVE-2024-30052 Important Remote Code Execution 4.7 No
2 CVE-2024-37325 Important Elevation of Privilege 8.1 No
3 CVE-2024-35265 Important Elevation of Privilege 7.0 No
4 CVE-2024-35263 Important Information Disclosure 5.7 No
5 CVE-2024-35254 Important Elevation of Privilege 7.1 No
6 CVE-2024-35253 Important Elevation of Privilege 4.4 No
7 CVE-2024-35252 Important Denial of Service 7.5 No
8 CVE-2024-35249 Important Remote Code Execution 8.8 No
9 CVE-2024-35248 Important Elevation of Privilege 7.3 No
10 CVE-2024-30104 Important Remote Code Execution 7.8 No
11 CVE-2024-30103 Important Remote Code Execution 8.8 No
12 CVE-2024-30102 Important Remote Code Execution 7.3 No
13 CVE-2024-30101 Important Remote Code Execution 7.5 No
14 CVE-2024-30100 Important Remote Code Execution 7.8 No
15 CVE-2024-30099 Important Elevation of Privilege 7.0 No
16 CVE-2024-30097 Important Remote Code Execution 8.8 No
17 CVE-2024-30096 Important Information Disclosure 5.5 No
18 CVE-2024-30095 Important Remote Code Execution 7.8 No
19 CVE-2024-30094 Important Remote Code Execution 7.8 No
20 CVE-2024-30093 Important Elevation of Privilege 7.3 No
21 CVE-2024-30091 Important Elevation of Privilege 7.8 No
22 CVE-2024-30090 Important Elevation of Privilege 7.0 No
23 CVE-2024-30089 Important Elevation of Privilege 7.8 No
24 CVE-2024-30088 Important Elevation of Privilege 7.0 No
25 CVE-2024-30087 Important Elevation of Privilege 7.8 No
26 CVE-2024-30086 Important Elevation of Privilege 7.8 No
27 CVE-2024-30085 Important Elevation of Privilege 7.8 No
28 CVE-2024-30084 Important Elevation of Privilege 7.0 No
29 CVE-2024-30083 Important Denial of Service 7.5 No
30 CVE-2024-30068 Important Elevation of Privilege 8.8 No
31 CVE-2024-30067 Important Elevation of Privilege 5.5 No
32 CVE-2024-30066 Important Elevation of Privilege 5.5 No
33 CVE-2024-30065 Important Denial of Service 5.5 No
34 CVE-2024-30064 Important Elevation of Privilege 8.8 No
35 CVE-2024-30063 Important Remote Code Execution 6.7 No
36 CVE-2024-30062 Important Remote Code Execution 7.8 No
37 CVE-2024-29060 Important Elevation of Privilege 6.7 No
38 CVE-2024-29187 Important Elevation of Privilege 7.3 No
39 CVE-2023-50868 Important Denial of Service 7.5 No
40 CVE-2024-35255 Important Elevation of Privilege 5.5 No
41 CVE-2024-35250 Important Elevation of Privilege 7.8 No
42 CVE-2024-30082 Important Elevation of Privilege 7.8 No
43 CVE-2024-30080 Critical Remote Code Execution 9.8 No
44 CVE-2024-30078 Important Remote Code Execution 8.8 No
45 CVE-2024-30077 Important Remote Code Execution 8.0 No
46 CVE-2024-30076 Important Elevation of Privilege 6.8 No
47 CVE-2024-30075 Important Remote Code Execution 8.0 No
48 CVE-2024-30074 Important Remote Code Execution 8.0 No
49 CVE-2024-30072 Important Remote Code Execution 7.8 No
50 CVE-2024-30070 Important Denial of Service 7.5 No
51 CVE-2024-30069 Important Information Disclosure 4.7 No

Notable Third-Party Patch Tuesday Updates:

PHP – Security researcher Orange Tsai uncovered a major vulnerability in PHP CGI, affecting all versions of PHP on Windows systems, enabling attackers to execute unauthorized code. Tracked under CVE-2024-4577, this vulnerability affects XAMPP, a widely used software package for deploying various web server components like PHP, MySQL, Apache Server, and Tomcat.

The development team misused the Windows’ encoding conversion feature, leading to this CVE. Attackers could exploit this flaw by using specific character strings to bypass security measures, leading to arbitrary code execution on remote PHP servers through argument injection attacks. This highlights the importance of thorough testing and review to prevent such vulnerabilities.

Google – announced Chrome 125, which among others includes a fix for a zero day vulnerability. CVE-2024-4947 is a type confusion flaw detected in Java Script V8 engine, which has already been exploited. This CVE enables a remote attacker to execute arbitrary code within a sandbox environment by utilizing a specifically crafted HTML page. Google didn’t provide further details.

Another notable issue resolved in Chrome 125 is CVE-2024-4948, a significant use-after-free vulnerability found in Dawn, an open-source implementation of the WebGPU standard across various platforms within Chromium.

GitHub – has released an advisory addressing a critical vulnerability in GitHub Enterprise Server. Identified as CVE-2024-4985, this vulnerability has the maximum CVSS score of 10 and is affecting all versions of Enterprise Server up to 3.13.0 that utilize SAML single sign-on (SSO) authentication with encrypted assertions enabled. Exploiting this vulnerability could allow an attacker to gain administrative privileges without authentication by changing SAML responses.

CheckPoint – Tracked under CVE-2024-24919, a critical zero-day vulnerability has been detected in CheckPoint VPNs, linked to attacks detected since April 2024. This vulnerability has a CVSS score of 8.6 and involves arbitrary file reading in gateways with IPSec VPN or Mobile Access blades. Exploitation could lead to access to sensitive information and domain administrator privileges. CheckPoint released urgent patches for their CloudGuard and Quantum product lines. This CVE allows remote exploitation without user interaction or special privileges on compromised CheckPoint gateways with remote access VPN and mobile access enabled.

Recommendations:

As always, you should patch everything as soon as possible… 😉 

But, that’s a lot easier said than done. The strategy is to prioritize what matters most and reduce the vulnerabilities with the greatest business impact. For this, organizations must improve how they measure, quantify, prioritize, and communicate risk. Balbix offers the following AI-powered capabilities:

#1 – CAASM > Understand your attack surface. An accurate & up-to-date inventory of on-premises, cloud, IoT/OT assets and software bill of materials (SBOM) is fundamental. Additionally, organizations need to understand:

  • What are the material assets?
  • Where are they located?
  • What data/business context is associated with them?
  • Do they have any existing security controls enabled?

#2 – RVBM > Prioritize and remediate critical vulnerabilities. Use severity, threat intelligence, asset exposure, compensating controls and business context to understand which vulnerabilities are being exploited and the financial impact of it (if exploited) to your organization. Use this data to prioritize ruthlessly.

#3 – CRQ > Quantify Cyber Risk. Using a language that is easily understandable by all i.e. monetary or currencies. It’s the only way to effectively communicate and compare risk across all different environments, software, geos, business units, and others.

But the true magic of Balbix happens when you put all these together:

The Balbix Platform started doing its homework as soon as CVEs were announced by vendors. No human interaction is needed. It’s all driven by AI. It learned about the new CVEs, the Cyber Threat Intelligence associated with each of them, and it correlated with each asset’s technical and business context to calculate the Balbix scores.

In this way the Risk Based Prioritization is already done and Balbix customers can simply start a Patch Prioritization workflow and automatically get the latest KB that needs to be installed on a set of assets / OS.

Create Patch Prioritization Project

Create Patch Prioritization Project - Details

This way Balbix customers have a clear understanding of the assets in scope, unique CVE detections, unique patches to be applied, etc. And most importantly, the priority in which patches need to be installed, to burn down risk in the most efficient way possible.

If you are interested in learning more, please sign up for a Balbix demo.