【漏洞信息】
微软官方发布了8月安全更新公告,包含了Windows TCP/IP、Windows Kernel、Windows Ancillary Function Driver for WinSock、Scripting Engine Memory、Windows Secure Channel等微软家族多个软件的安全更新补丁。请相关用户及时更新对应补丁修复漏洞。
1、本月存在6个在野0day漏洞,经研判,需要重点关注的在野0day漏洞如下:
· Windows内核特权提升漏洞(CVE-2024-38106)
· 脚本引擎内存损坏漏洞(CVE-2024-38178)
· Windows Ancillary Function Driver for WinSock特权提升漏洞(CVE-2024-38193)
2、本月披露漏洞中,被利用可能性较高的漏洞如下:
· Windows TCP/IP 远程代码执行漏洞(CVE-2024-38063)
· Windows内核特权提升漏洞(CVE-2024-38106)
· Windows Ancillary Function Driver for WinSock特权提升漏洞(CVE-2024-38141)
· 脚本引擎内存损坏漏洞(CVE-2024-38178)
· Windows Ancillary Function Driver for WinSock特权提升漏洞(CVE-2024-38193)
· Windows Common Log File System Driver特权提升漏洞(CVE-2024-38196)
· Kernel Streaming WOW Thunk 服务驱动程序特权提升漏洞(CVE-2024-38125)
· Kernel Streaming WOW Thunk 服务驱动程序特权提升漏洞(CVE-2024-38144)
· Microsoft DWM 核心库特权提升漏洞(CVE-2024-38147)
· Windows Secure Channel拒绝服务漏洞(CVE-2024-38148)
· Windows DWM 核心库特权提升漏洞(CVE-2024-38150)
3、本月披露漏洞中较为高危的漏洞如下:
· Azure Stack Hub 欺骗漏洞(CVE-2024-38108)
· Azure Health Bot 特权提升漏洞(CVE-2024-38109)
· Windows TCP/IP 远程代码执行漏洞(CVE-2024-38063)
· Windows Reliable Multicast Transport Driver (RMCAST)远程代码执行漏洞(CVE-2024-38140)
· Windows Ancillary Function Driver for WinSock特权提升漏洞(CVE-2024-38141)
· Windows Network Virtualization远程代码执行漏洞(CVE-2024-38159)
· Windows Network Virtualization远程代码执行漏洞(CVE-2024-38160)
· Windows Line Printer Daemon (LPD)服务远程代码执行漏洞(CVE-2024-38199)
· Windows Ancillary Function Driver for WinSock特权提升漏洞(CVE-2024-38193)
1、Windows 内核特权提升漏洞(CVE-2024-38106) | |||
漏洞类型 | 访问控制错误 | CVSS3.1评分 | 7 |
CVE编号 | CVE-2024-38106 | 安恒CERT编号 | DM-202406-001570 |
影响主体 | |||
Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
CVSS向量 | |||
访问途径(AV) | 本地 | 攻击复杂度(AC) | 高 |
所需权限(PR) | 低 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
2、脚本引擎内存损坏漏洞(CVE-2024-38178) | |||
漏洞类型 | 远程代码执行 | CVSS3.1评分 | 7.5 |
CVE编号 | CVE-2024-38178 | 安恒CERT编号 | DM-202406-00164265 |
影响主体 | |||
Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) CVSS向量 | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 无需任何权限 | 用户交互(UI) | 需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
3、Windows Ancillary Function Driver for WinSock特权提升漏洞(CVE-2024-38193) | |||
漏洞类型 | 权限提升 | CVSS3.1评分 | 7.8 |
CVE编号 | CVE-2024-38193 | 安恒CERT编号 | DM-202406-001657 |
影响主体 | |||
Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
访问途径(AV) | 本地 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 低 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
4、Windows TCP/IP 远程代码执行漏洞(CVE-2024-38063) | |||
漏洞类型 | 远程代码执行 | CVSS3.1评分 | 9.8 |
CVE编号 | CVE-2024-38063 | 安恒CERT编号 | DM-202406-001527 |
影响主体 | |||
Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 无需任何权限 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
5、Windows Ancillary Function Driver for WinSock特权提升漏洞(CVE-2024-38141) | |||
漏洞类型 | 权限提升 | CVSS3.1评分 | 7.8 |
CVE编号 | CVE-2024-38141 | 安恒CERT编号 | DM-202406-001605 |
影响主体 | |||
Windows 10 for 32-bit Systems | |||
访问途径(AV) | 本地 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 低 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
6、Windows Common Log File System Driver特权提升漏洞(CVE-2024-38196) | |||
漏洞类型 | 权限提升 | CVSS3.1评分 | 7.8 |
CVE编号 | CVE-2024-38196 | 安恒CERT编号 | DM-202406-001660 |
影响主体 | |||
Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
访问途径(AV) | 本地 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 低 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
7、Kernel Streaming WOW Thunk 服务驱动程序特权提升漏洞(CVE-2024-38125) | |||
漏洞类型 | 权限提升 | CVSS3.1评分 | 7.8 |
CVE编号 | CVE-2024-38125 | 安恒CERT编号 | DM-202406-001589 |
影响主体 | |||
Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
访问途径(AV) | 本地 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 低 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
8、Kernel Streaming WOW Thunk 服务驱动程序特权提升漏洞(CVE-2024-38144) | |||
漏洞类型 | 权限提升 | CVSS3.1评分 | 8.8 |
CVE编号 | CVE-2024-38144 | 安恒CERT编号 | DM-202406-001608 |
影响主体 | |||
Windows 10 for 32-bit Systems Windows 10 for x64-based Systems Windows 10 Version 1607 for 32-bit Systems Windows 10 Version 1607 for x64-based Systems Windows 10 Version 1809 for 32-bit Systems Windows 10 Version 1809 for ARM64-based Systems Windows 10 Version 1809 for x64-based Systems Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Windows Server 2008 R2 for x64-based Systems Service Pack 1 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2012 Windows Server 2012 (Server Core installation) Windows Server 2012 R2 Windows Server 2012 R2 (Server Core installation) Windows Server 2016 Windows Server 2016 (Server Core installation) Windows Server 2019 Windows Server 2019 (Server Core installation) Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 低 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
9、Microsoft DWM 核心库特权提升漏洞(CVE-2024-38147) | |||
漏洞类型 | 权限提升 | CVSS3.1评分 | 7.8 |
CVE编号 | CVE-2024-38147 | 安恒CERT编号 | DM-202406-001611 |
影响主体 | |||
Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
访问途径(AV) | 本地 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 低 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
10、Windows Secure Channel拒绝服务漏洞(CVE-2024-38148) | |||
漏洞类型 | 拒绝服务 | CVSS3.1评分 | 7.8 |
CVE编号 | CVE-2024-38148 | 安恒CERT编号 | DM-202406-001612 |
影响主体 | |||
Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 无需任何权限 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 无 |
完整性影响(I) | 无 | 可用性影响(A) | 高 |
11、Windows DWM 核心库特权提升漏洞(CVE-2024-38150) | |||
漏洞类型 | 权限提升 | CVSS3.1评分 | 7.8 |
CVE编号 | CVE-2024-38150 | 安恒CERT编号 | DM-202406-001614 |
影响主体 | |||
Windows 10 Version 21H2 for 32-bit Systems Windows 10 Version 21H2 for ARM64-based Systems Windows 10 Version 21H2 for x64-based Systems Windows 10 Version 22H2 for 32-bit Systems Windows 10 Version 22H2 for ARM64-based Systems Windows 10 Version 22H2 for x64-based Systems Windows 11 version 21H2 for ARM64-based Systems Windows 11 version 21H2 for x64-based Systems Windows 11 Version 22H2 for ARM64-based Systems Windows 11 Version 22H2 for x64-based Systems Windows 11 Version 23H2 for ARM64-based Systems Windows 11 Version 23H2 for x64-based Systems Windows 11 Version 24H2 for ARM64-based Systems Windows 11 Version 24H2 for x64-based Systems Windows Server 2022 Windows Server 2022 (Server Core installation) Windows Server 2022, 23H2 Edition (Server Core installation) | |||
访问途径(AV) | 本地 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 低 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
12、Azure Stack Hub 欺骗漏洞(CVE-2024-38108) | |||
危害等级 | 严重 | CVSS3.1评分 | 9.3 |
CVE编号 | CVE-2024-38108 | 安恒CERT编号 | DM-202406-001572 |
漏洞描述 | |||
Azure Stack Hub 是微软提供的一种混合云平台,它允许企业在自己的数据中心内运行 Azure 服务。Azure Stack Hub 存在身份欺骗漏洞,未经身份验证的攻击者可以通过诱导受害者在虚拟机的网页浏览器中加载恶意代码来利用此漏洞,从而使攻击者能够利用虚拟机的隐式身份。 | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 无需任何权限 | 用户交互(UI) | 需要 |
影响范围(S) | 改变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 无 |
参考链接 | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38108 |
13、Windows Network Virtualization远程代码执行漏洞(CVE-2024-38159) | |||
危害等级 | 严重 | CVSS3.1评分 | 9.1 |
CVE编号 | CVE-2024-38159 | 安恒CERT编号 | DM-202406-001623 |
漏洞描述 | |||
Windows Network Virtualization 中存在远程代码执行漏洞,具备较高权限的攻击者可利用该漏洞实现 guest-to-host 逃逸。 | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 高 | 用户交互(UI) | 不需要 |
影响范围(S) | 改变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
参考链接 | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38159 |
14、Windows Network Virtualization远程代码执行漏洞(CVE-2024-38160) | |||
危害等级 | 严重 | CVSS3.1评分 | 9.1 |
CVE编号 | CVE-2024-38160 | 安恒CERT编号 | DM-202406-001624 |
漏洞描述 | |||
Windows Network Virtualization 中存在远程代码执行漏洞,具备较高权限的攻击者可利用该漏洞实现 guest-to-host 逃逸。 | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 高 | 用户交互(UI) | 不需要 |
影响范围(S) | 改变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
参考链接 | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38160 |
15、Windows Line Printer Daemon (LPD)服务远程代码执行漏洞(CVE-2024-38199) | |||
危害等级 | 严重 | CVSS3.1评分 | 9.8 |
CVE编号 | CVE-2024-38199 | 安恒CERT编号 | DM-202406-001663 |
漏洞描述 | |||
Windows Line Printer Daemon Service 是 Windows 操作系统中的一个网络服务,它使用 Line Printer Remote (LPR)/Line Printer Daemon (LPD) 协议来处理网络打印任务,支持 Unix/Linux 系统与 Windows 系统之间的跨平台打印。 本次漏洞发生在 LPD 协议中,未通过身份验证的攻击者可通过网络向存在漏洞的 Windows Line Printer Daemon Service 发送特制的打印任务。成功利用该漏洞可在服务器上远程执行代码。 | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 无需任何权限 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
参考链接 | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38199 |
16、Windows Reliable Multicast Transport Driver (RMCAST)远程代码执行漏洞(CVE-2024-38140) | |||
危害等级 | 严重 | CVSS3.1评分 | 9.8 |
CVE编号 | CVE-2024-38140 | 安恒CERT编号 | DM-202406-001604 |
漏洞描述 | |||
Windows Reliable Multicast Transport Driver (RMCAST) 是 Windows 操作系统中的一种网络驱动程序,它用于支持可靠的多播传输。未经身份验证的攻击者可通过 socket 向服务器上的 Windows Pragmatic General Multicast (PGM) 发送特制数据包来利用该漏洞,实现远程代码执行,且用户无需进行任何交互。 | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 无需任何权限 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
参考链接 | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38140 |
17、Azure Health Bot 特权提升漏洞(CVE-2024-38109) | |||
危害等级 | 严重 | CVSS3.1评分 | 9.8 |
CVE编号 | CVE-2024-38109 | 安恒CERT编号 | DM-202406-001573 |
漏洞描述 | |||
Azure Health Bot 是 Microsoft 提供的一个基于云的服务,专门为医疗领域设计,用于创建和部署 AI 驱动的聊天机器人。Azure Health Bot 服务存在权限提升漏洞,经过身份验证的攻击者可利用 Azure Health Bot 服务端的 SSRF 漏洞,通过网络提升权限。 | |||
访问途径(AV) | 网络 | 攻击复杂度(AC) | 低 |
所需权限(PR) | 无需任何权限 | 用户交互(UI) | 不需要 |
影响范围(S) | 不变 | 机密性影响(C) | 高 |
完整性影响(I) | 高 | 可用性影响(A) | 高 |
参考链接 | https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-38109 |
【修复方案】
目前微软针对支持的产品已发布升级补丁修复了上述漏洞,请用户参考官方通告及时下载更新补丁。补丁获取:https://msrc.microsoft.com/update-guide/vulnerability
Windows 更新:
自动更新:Microsoft Update默认启用,当系统检测到可用更新时,将会自动下载更新并在下一次启动时安装。
手动更新:
1、点击“开始菜单”或按Windows快捷键,点击进入“设置”。
2、选择“更新和安全”,进入“Windows更新”(Windows 8、Windows 8.1、Windows Server 2012以及Windows Server 2012 R2可通过控制面板进入“Windows更新”,具体步骤为“控制面板”->“系统和安全”->“Windows更新”)。
3、选择“检查更新”,等待系统将自动检查并下载可用更新。
4、重启计算机,安装更新系统重新启动后,可通过进入“Windows更新”->“查看更新历史记录”查看是否成功安装了更新。
【参考资料】
https://msrc.microsoft.com/update-guide/releaseNote/2024-Aug