The August 2024 Security Update Review
August 13, 2024 | Dustin ChildsI have successfully survived Summer Hacker Camp, and I hope you have too. And we return just in time for Patch Tuesday and a new crop of 0-days as Microsoft and Adobe have released their regularly scheduled updates. Take a break from your regular activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check it out here:
Adobe Patches for August 2024
For August, Adobe released 11 security bulletins addressing 71 CVEs in Adobe Illustrator. Dimension, Photoshop, InDesign, Acrobat and Reader, Bridge, Substance 3D Stager, Commerce, InCopy. Substance 3D Sampler, and Substance 3D Designer. A total of 14 of these bugs came through the ZDI program. The largest of these updates is for Adobe Commerce, which includes several fixes for Critical-rated bode execution bugs. The patch for InDesign also corrects many code execution bugs. However, I’m probably most concerned about the update for Acrobat and Reader, as maliciously crafted PDFs are often used in ransomware.
The fixes for Photoshop, Substance 3D Stager, InCopy, and Substance 3D Designer each address a single Critical-rated CVE that could lead to code execution. The patch for Illustrator corrects seven bugs, but most of these are rated Important. The Dimension patch has three Critical and three Important bugs. ZDI’s Mat Powell reported the three bugs fixed in Adobe Bridge. The final Adobe patch for August is for Substance 3D Sampler and fixes four bugs.
None of the bugs fixed by Adobe this month are listed as publicly known or under active attack at the time of release. Adobe categorizes these updates as a deployment priority rating of 3.
Microsoft Patches for August 2024
This month, Microsoft released 90 new CVEs in Windows and Windows Components; Office and Office Components; .NET and Visual Studio; Azure; Co-Pilot; Microsoft Dynamics; Teams; and (of course) Secure Boot. With the third-party bugs also listed, it brings the total CVE count to 102. Four of these bugs came through the ZDI program, including one of the bugs listed as under active exploit.
Of the patches being released today, seven are rated Critical, 79 are rated Important, and one is rated Moderate in severity. While this isn’t the biggest release, it is unusual to see so many bugs listed as public or under active attack in a single release.
Four of these CVEs are listed as publicly known, and six others are listed as under active attack. Let’s take a closer look at some of the more interesting updates for this month, starting with the vulnerabilities currently being exploited:
CVE-2024-38178 - Scripting Engine Memory Corruption Vulnerability
This vulnerability is somewhat unusual as it requires the target to be using Edge in Internet Explorer mode. It seems the long arm of IE again reaches out from beyond the vale to cause problems. Once Edge is in IE mode, it just takes a user to click a link to get code execution. This patch also comes with a fix for Windows 11 v24H2, which isn’t generally available. However, Copilot+ devices ship with this Windows version, thus the update here.
CVE-2024-38193 - Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
This privilege escalation bug allows attackers to run code as SYSTEM. These types of bugs are typically paired with a code execution bug to take over a target. Microsoft doesn’t provide any indication of how broadly this is being exploited, but considering the source, if it’s not in ransomware already, it likely will be soon.
CVE-2024-38106 - Windows Kernel Elevation of Privilege Vulnerability
This is another privilege escalation bug under active attack that leads to SYSTEM privileges. Microsoft lists exploit complexity as high due to the attacker needing to win a race condition. However, some races are easier to run than others. It’s times like this where the CVSS can be misleading. Race conditions do lead to complexity high in the CVSS score, but with attacks in the wild, it’s clear this bug is readily exploitable.
CVE-2024-38107 - Windows Power Dependency Coordinator Elevation of Privilege Vulnerability
Here’s yet another privilege escalation bug that leads to SYSTEM being exploited in the wild. If you’re not familiar with the Power Dependency Coordinator (PDC), it’s a component of Modern Standby. Essentially, its purpose was to allow devices to “instantly” wake from sleep. It was introduced in Windows 8. It also shows how adding capabilities can often add attack surface, too.
CVE-2024-38189 - Microsoft Project Remote Code Execution Vulnerability
It’s definitely odd to see a code execution bug in Project, but not only do we have one here, it’s being exploited in the wild. For the most part, this is your typical open-and-own bug, but in this case, the target allows macros to run from the internet. The target also needs to disable the VBA Macro Notification Settings. If you do this, please don’t. Here’s some guidance on how to block macros from running in Office products. And if you’re opening random Project files from dicey resources, please go re-take your phishing training.
Here’s the full list of CVEs released by Microsoft for August 2024:
CVE | Title | Severity | CVSS | Public | Exploited | Type |
CVE-2024-38189 | Microsoft Project Remote Code Execution Vulnerability | Important | 8.8 | No | Yes | RCE |
CVE-2024-38178 | Scripting Engine Memory Corruption Vulnerability | Important | 7.5 | No | Yes | RCE |
CVE-2024-38193 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Important | 7.8 | No | Yes | EoP |
CVE-2024-38106 | Windows Kernel Elevation of Privilege Vulnerability | Important | 7 | No | Yes | EoP |
CVE-2024-38107 | Windows Power Dependency Coordinator Elevation of Privilege Vulnerability | Important | 7.8 | No | Yes | EoP |
CVE-2024-38213 | Windows Mark of the Web Security Feature Bypass Vulnerability | Moderate | 6.5 | No | Yes | SFB |
CVE-2024-38200 | Microsoft Office Spoofing Vulnerability | Important | 7.5 | Yes | No | Spoofing |
CVE-2024-38199 | Windows Line Printer Daemon (LPD) Service Remote Code Execution Vulnerability | Important | 9.8 | Yes | No | RCE |
CVE-2024-21302 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability | Important | 6.7 | Yes | No | EoP |
CVE-2024-38202 | Windows Update Stack Elevation of Privilege Vulnerability | Important | 7.3 | Yes | No | EoP |
CVE-2024-38109 | Azure Health Bot Elevation of Privilege Vulnerability | Critical | 9.1 | No | No | EoP |
CVE-2024-38206 | Microsoft Copilot Studio Information Disclosure Vulnerability | Critical | 8.5 | No | No | Info |
CVE-2024-38166 | Microsoft Dynamics 365 Cross-site Scripting Vulnerability | Critical | 8.2 | No | No | XSS |
CVE-2022-3775 * | Redhat: CVE-2022-3775 grub2 - Heap based out-of-bounds write when rendering certain Unicode sequences | Critical | 7.1 | No | No | RCE |
CVE-2023-40547 * | Redhat: CVE-2023-40547 Shim - RCE in HTTP boot support may lead to secure boot bypass | Critical | 8.3 | No | No | SFB |
CVE-2024-38159 | Windows Network Virtualization Remote Code Execution Vulnerability | Critical | 9.1 | No | No | RCE |
CVE-2024-38160 | Windows Network Virtualization Remote Code Execution Vulnerability | Critical | 9.1 | No | No | RCE |
CVE-2024-38140 | Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability | Critical | 9.8 | No | No | RCE |
CVE-2024-38063 | Windows TCP/IP Remote Code Execution Vulnerability | Critical | 9.8 | No | No | RCE |
CVE-2024-38168 | .NET and Visual Studio Denial of Service Vulnerability | Important | 7.5 | No | No | DoS |
CVE-2024-38167 | .NET and Visual Studio Information Disclosure Vulnerability | Important | 6.5 | No | No | Info |
CVE-2024-38098 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38162 | Azure Connected Machine Agent Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38195 | Azure CycleCloud Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2024-38157 | Azure IoT SDK Remote Code Execution Vulnerability | Important | 7 | No | No | RCE |
CVE-2024-38158 | Azure IoT SDK Remote Code Execution Vulnerability | Important | 7 | No | No | RCE |
CVE-2024-38201 | Azure Stack Hub Elevation of Privilege Vulnerability | Important | 7 | No | No | EoP |
CVE-2024-38108 | Azure Stack Hub Spoofing Vulnerability | Important | 9.3 | No | No | Spoofing |
CVE-2024-38131 | Clipboard Virtual Channel Extension Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38191 | Kernel Streaming Service Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38125 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38134 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38144 | Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability | Important | 8.8 | No | No | EoP |
CVE-2024-38147 | Microsoft DWM Core Library Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38211 | Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability | Important | 8.2 | No | No | XSS |
CVE-2024-38218 | Microsoft Edge (HTML-based) Memory Corruption Vulnerability | Important | 8.4 | No | No | RCE |
CVE-2024-38172 | Microsoft Excel Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2024-38170 | Microsoft Excel Remote Code Execution Vulnerability | Important | 7.1 | No | No | RCE |
CVE-2024-38118 | Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability | Important | 5.5 | No | No | Info |
CVE-2024-38122 | Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability | Important | 5.5 | No | No | Info |
CVE-2024-38169 | Microsoft Office Visio Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2024-38084 | Microsoft OfficePlus Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38173 | Microsoft Outlook Remote Code Execution Vulnerability | Important | 6.7 | No | No | RCE |
CVE-2024-38171 | Microsoft PowerPoint Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2024-38197 † | Microsoft Teams for iOS Spoofing Vulnerability | Important | 6.5 | No | No | Spoofing |
CVE-2024-38117 | NTFS Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2022-2601 * | Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass | Important | 8.6 | No | No | SFB |
CVE-2024-38155 | Security Center Broker Information Disclosure Vulnerability | Important | 5.5 | No | No | Info |
CVE-2024-38180 | SmartScreen Prompt Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38141 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38177 | Windows App Installer Spoofing Vulnerability | Important | 7.8 | No | No | Spoofing |
CVE-2024-38123 | Windows Bluetooth Driver Information Disclosure Vulnerability | Important | 4.4 | No | No | Info |
CVE-2024-38215 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38196 | Windows Common Log File System Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38165 | Windows Compressed Folder Tampering Vulnerability | Important | 6.5 | No | No | Tamper |
CVE-2024-38138 | Windows Deployment Services Remote Code Execution Vulnerability | Important | 7.5 | No | No | RCE |
CVE-2024-37968 | Windows DNS Spoofing Vulnerability | Important | 7.5 | No | No | Spoofing |
CVE-2024-38150 | Windows DWM Core Library Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38127 | Windows Hyper-V Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38223 | Windows Initial Machine Configuration Elevation of Privilege Vulnerability | Important | 6.8 | No | No | EoP |
CVE-2024-38114 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38115 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38116 | Windows IP Routing Management Snapin Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-29995 | Windows Kerberos Elevation of Privilege Vulnerability | Important | 8.1 | No | No | EoP |
CVE-2024-38133 | Windows Kernel Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38153 | Windows Kernel Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38151 | Windows Kernel Information Disclosure Vulnerability | Important | 5.5 | No | No | Info |
CVE-2024-38184 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38185 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38186 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38187 | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38145 | Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability | Important | 7.5 | No | No | DoS |
CVE-2024-38146 | Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability | Important | 7.5 | No | No | DoS |
CVE-2024-38161 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Important | 6.8 | No | No | RCE |
CVE-2024-38126 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Important | 7.5 | No | No | DoS |
CVE-2024-38132 | Windows Network Address Translation (NAT) Denial of Service Vulnerability | Important | 7.5 | No | No | DoS |
CVE-2024-38152 | Windows OLE Remote Code Execution Vulnerability | Important | 7.8 | No | No | RCE |
CVE-2024-38198 | Windows Print Spooler Elevation of Privilege Vulnerability | Important | 7.5 | No | No | EoP |
CVE-2024-38135 | Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38136 | Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability | Important | 7 | No | No | EoP |
CVE-2024-38137 | Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability | Important | 7 | No | No | EoP |
CVE-2024-38214 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability | Important | 6.5 | No | No | Info |
CVE-2024-38121 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38128 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38130 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38154 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38120 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Important | 8.8 | No | No | RCE |
CVE-2024-38148 | Windows Secure Channel Denial of Service Vulnerability | Important | 7.5 | No | No | DoS |
CVE-2024-38142 | Windows Secure Kernel Mode Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38163 † | Windows Update Stack Elevation of Privilege Vulnerability | Important | 7.8 | No | No | EoP |
CVE-2024-38143 | Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability | Important | 4.2 | No | No | EoP |
CVE-2024-38222 | Microsoft Edge (Chromium-based) Information Disclosure Vulnerability | Moderate | Unknown | No | No | Info |
CVE-2024-38219 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | Moderate | 6.5 | No | No | RCE |
CVE-2024-6990 * | Chromium: CVE-2024-6990 Uninitialized Use in Dawn | Critical | N/A | No | No | RCE |
CVE-2024-7532 * | Chromium: CVE-2024-7533 Use after free in Sharing | Critical | N/A | No | No | RCE |
CVE-2024-7255 * | Chromium: CVE-2024-7255 Out of bounds read in WebTransport | High | N/A | No | No | RCE |
CVE-2024-7256 * | Chromium: CVE-2024-7256 Insufficient data validation in Dawn | High | N/A | No | No | RCE |
CVE-2024-7550 * | Chromium: CVE-2024-7532 Out of bounds memory access in ANGLE | High | N/A | No | No | RCE |
CVE-2024-7533 * | Chromium: CVE-2024-7534 Heap buffer overflow in Layout | High | N/A | No | No | RCE |
CVE-2024-7534 * | Chromium: CVE-2024-7535 Inappropriate implementation in V8 | High | N/A | No | No | RCE |
CVE-2024-7535 * | Chromium: CVE-2024-7536 Use after free in WebAudio | High | N/A | No | No | RCE |
CVE-2024-7536 * | Chromium: CVE-2024-7550 Type Confusion in V8 | High | N/A | No | No | RCE |
* Indicates this CVE had been released by a third party and is now being included in Microsoft releases.
† Indicates further administrative actions are required to fully address the vulnerability.
You may have noticed I didn’t talk about the sixth bug under active attack. That’s because the ZDI researcher who found it, Peter Girnus, has a full blog on it coming out this Thursday. Stay tuned for all the details.
Moving on to the other code execution bugs, we’re greeted with three different CVSS 9.8 bugs right off the top. The worst is likely the bug in TCP/IP that would allow a remote, unauthenticated attacker to get elevated code execution just by sending specially crafted IPv6 packets to an affected target. That means it’s wormable. You can disable IPv6 to prevent this exploit, but IPv6 is enabled by default on just about everything. It’s a similar attack scenario for the Reliable Multicast Transport Driver (RMCAST), but in this case, you need a service listening as a receiver on PGM to be vulnerable. That’s a bit less likely. The Line Printer Daemon (LPD) has a bug with a similar consequence, but LPD isn’t installed by default (and shouldn’t be reachable from the Internet). That’s why it’s listed as Important rather than Critical despite its CVSS 9.8 rating. However, if you are running LPD, definitely treat this as a Critical update.
Looking at the other code execution bugs, thankfully most are more mundane. Office features heavily with typical open-and-own bugs. One that does stand out is the patch for Outlook. The Preview Pane is an attack vector; however, the attacker needs access to the target Outlook account for exploitation. Two bugs in the Network Virtualization component could cause some grief. Microsoft states, “By manipulating the content of the Memory Descriptor List (MDL), the attacker could cause unauthorized memory writes or even free a valid block currently in use, leading to a critical guest-to-host escape.” If you’re using virtualization, definitely test and deploy that one quickly. The bug in the Mobile Broadband Driver requires physical access. There are also a lot of RCE bugs in routing protocols, but many of these are older protocols where exploitation would be highly unlikely. I would also pay attention to the SmartScreen bug, as that has proven to be a popular target for exploitation. Finally, the bug in Azure CycleCloud could allow an authenticated attacker to acquire the storage account credentials and runtime data. These could then be used to create a malicious script to get remote code execution on any cluster in the CycleCloud instance.
There are 36 fixes for Elevation of Privilege (EoP) bugs in this release including those already. Mentioned. However, most of these either lead to SYSTEM-level code execution or administrative privileges if an authenticated user runs specially crafted code. There are also a couple of cloud-based bugs, like the one in Azure Health Bot, that require no action and are just being documented publicly. One of the kernel-mode driver bugs could be used for a sandbox escape. The bug in the Azure Stack Hub would involve some social engineering as the attacker would need to send a malicious JSON file to a target, but NOT have the target open and review it. Seems unlikely.
The big news for privilege escalation bugs comes from Black Hat and DEFCON as a researcher presented how to downgrade certain files in the OS to a vulnerable state and then exploit them. We’ve seen downgrade attacks in other products, but it’s certainly interesting research to find one in the Secure Kernel Mode component. The researcher also demonstrated a downgrade attack in the Update Stack as well. While the research is public, there are currently no known exploits targeting these vulnerabilities.
Speaking of bugs disclosed during Hacker Summer Camp, one of the five Spoofing fixes was actually documented back on August 8. It’s listed as Office Spoofing, but it results in NTLM relaying. There’s still no official fix for this, but Microsoft states people are not affected, “on all in-support versions of Microsoft Office and Microsoft 365,” due to a change in Feature Flighting. I would still test and update quickly once a patch is available. The bug in Azure Stack Hub is a simple cross-site scripting (XSS) bug. The bug in Teams for iOS allows attacks to appear as someone else within Teams. You’ll need to download an updated client to resolve this one. The App Installer bug could trick users into installing software they didn’t intend to install. There are no real details provided for the spoofing bug in DNS, but these usually result in the DNS server providing false results to queries.
There are only nine information disclosure bugs receiving fixes this month and most only result in info leaks consisting of unspecified memory contents. There are a few exceptions. The bug in RRAS could disclose the ever-ethereal “sensitive information”. The bug in Copilot could also disclose sensitive info, but this has already been corrected and is only being documented. The bug in .NET and Visual Studio could disclose targeted emails, but the attack scenario isn’t clear. The bug in Edge (Chromium-based) is more interesting. An attacker could expose Edge WebUI permissions. This would allow them to access target data from microphones and cameras.
The August release includes fixes for a handful of Denial-of-Service (DoS) bugs. However, Microsoft again provides no additional information about these vulnerabilities.
There’s also one bug in the ill-defined “Tampering” category. It requires a user to open a specially crafted file, yet it also lists the attack vector as Network. Maybe the file needs to be on a shared drive? Microsoft also does not provide the result of the tampering. It’s possible that compressed files could be crafted to evade detection from EDR/XDR. We’ve seen similar tactics used by ransomware in the past, however, without further details from Microsoft, this is all just speculation.
Finally, the August release is rounded out by two XSS in Microsoft Dynamics (on-premises).
There are no new advisories in this month’s release, but there was an update to the servicing stack.
Looking Ahead
The next Patch Tuesday of 2024 will be on September 10, and I’ll return with details and pumpkin-spiced patch analysis then. Until then, stay safe, happy patching, and may all your reboots be smooth and clean!