【风险通告】微软9月安全更新补丁和多个高危漏洞风险提示

文摘   2024-09-11 17:52   浙江  

漏洞公告


微软官方发布了9月安全更新公告,包含了Microsoft SharePoint Server、Microsoft Publisher、Windows Installer、Windows Win32 Kernel Subsystem、Win32k等微软家族多个软件的安全更新补丁。请相关用户及时更新对应补丁修复漏洞。


01

漏洞详情


1、本月存在4个在野0day漏洞,经研判,需要重点关注的在野0day漏洞如下:

· Windows Installer特权提升漏洞(CVE-2024-38014)

· Windows Web 安全功能标记绕过漏洞(CVE-2024-38217)

· Microsoft Publisher安全功能绕过漏洞(CVE-2024-38226)

2、本月披露漏洞中,被利用可能性较高的漏洞如下:

· Microsoft SharePoint Server远程代码执行漏洞(CVE-2024-38018)

· Microsoft SharePoint Server远程代码执行漏洞(CVE-2024-38227)

· Microsoft SharePoint Server远程代码执行漏洞(CVE-2024-38228)


· Kernel Streaming WOW Thunk服务驱动程序特权提升漏洞(CVE-2024-38237)

· Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38238)

· Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38241)

· Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38242)

· Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38243)

· Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38244)

· Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38245)

· Win32k特权提升漏洞(CVE-2024-38246)

· Windows Graphics Component特权提升漏洞(CVE-2024-38247)

· Windows Graphics Component特权提升漏洞(CVE-2024-38249)

· Windows Win32 Kernel Subsystem特权提升漏洞(CVE-2024-38252)

· Windows Win32 Kernel Subsystem特权提升漏洞(CVE-2024-38253)

· Windows Setup and Deployment特权提升漏洞(CVE-2024-43457)

· Windows MSHTML Platform欺骗漏洞(CVE-2024-43461)

· Microsoft SharePoint Server远程代码执行漏洞(CVE-2024-43464)

3、本月披露的严重漏洞如下:

· Microsoft Windows Update远程代码执行漏洞(CVE-2024-43491)


02

重点关注漏洞


1、Windows Installer特权提升漏洞(CVE-2024-38014)

漏洞类型

限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38014

安恒CERT编号

DM-202406-001470

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022

Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


2、Windows Web安全功能标记绕过漏洞(CVE-2024-38217)

漏洞类型

安全功能标记绕过

CVSS3.1评分

5.4

CVE编号

CVE-2024-38217

安恒CERT编号

DM-202406-00168165

影响主体

Windows 10 for 32-bit Systems

Windows 10 for x64-based Systems

Windows 10 Version 1607 for 32-bit Systems

Windows 10 Version 1607 for x64-based Systems

Windows 10 Version 1809 for 32-bit Systems

Windows 10 Version 1809 for ARM64-based Systems

Windows 10 Version 1809 for x64-based Systems

Windows 10 Version 21H2 for 32-bit Systems

Windows 10 Version 21H2 for ARM64-based Systems

Windows 10 Version 21H2 for x64-based Systems

Windows 10 Version 22H2 for 32-bit Systems

Windows 10 Version 22H2 for ARM64-based Systems

Windows 10 Version 22H2 for x64-based Systems

Windows 11 version 21H2 for ARM64-based Systems

Windows 11 version 21H2 for x64-based Systems

Windows 11 Version 22H2 for ARM64-based Systems

Windows 11 Version 22H2 for x64-based Systems

Windows 11 Version 23H2 for ARM64-based Systems

Windows 11 Version 23H2 for x64-based Systems

Windows 11 Version 24H2 for ARM64-based Systems

Windows 11 Version 24H2 for x64-based Systems

Windows Server 2016

Windows Server 2016 (Server Core installation)

Windows Server 2019

Windows Server 2019 (Server Core installation)

Windows Server 2022

Windows Server 2022 (Server Core installation)

Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

网络

攻击复杂度(AC)


所需权限(PR)

无需任何权限

用户交互(UI)

需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


3、Microsoft Publisher安全功能绕过漏洞(CVE-2024-38226)

漏洞类型

安全功能绕过

CVSS3.1评分

7.3

CVE编号

CVE-2024-38226

安恒CERT编号

DM-202406-001690

影响主体

Microsoft Office 2016 (32-bit edition)
Microsoft Office 2016 (64-bit edition)
Microsoft Office 2019 for 32-bit editions
Microsoft Office 2019 for 64-bit editions
Microsoft Office LTSC 2021 for 32-bit editions
Microsoft Office LTSC 2021 for 64-bit editions
Microsoft Publisher 2016 (32-bit edition)
Microsoft Publisher 2016 (64-bit edition)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


4、Microsoft SharePoint Server远程代码执行漏洞(CVE-2024-38018)

漏洞类型

远程代码执行

CVSS3.1评分

8.8

CVE编号

CVE-2024-38018

安恒CERT编号

DM-202406-001474

影响主体

Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019
Microsoft SharePoint Server Subscription Edition

CVSS向量

访问途径(AV)

网络

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


5、Microsoft SharePoint Server远程代码执行漏洞(CVE-2024-38227)

漏洞类型

远程代码执行

CVSS3.1评分

7.2

CVE编号

CVE-2024-38227

安恒CERT编号

DM-202406-001691

影响主体

Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019
Microsoft SharePoint Server Subscription Edition

CVSS向量

访问途径(AV)

网络

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


6、Microsoft SharePoint Server远程代码执行漏洞(CVE-2024-38228)

漏洞类型

远程代码执行

CVSS3.1评分

7.2

CVE编号

CVE-2024-38228

安恒CERT编号

DM-202406-001692

影响主体

Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019
Microsoft SharePoint Server Subscription Edition

CVSS向量

访问途径(AV)

网络

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


7、Kernel Streaming WOW Thunk服务驱动程序特权提升漏洞(CVE-2024-38237)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38237

安恒CERT编号

DM-202406-001701

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


8、Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38238)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38238

安恒CERT编号

DM-202406-001702

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


9、Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38241)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38241

安恒CERT编号

DM-202406-001705

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


10、Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38242)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38242

安恒CERT编号

DM-202406-001706

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)

完整性影响 (I)

可用性影响 (A)


11、Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38243

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38243

安恒CERT编号

DM-202406-001707

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)

12、Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38244)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38244

安恒CERT编号

DM-202406-001708

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


13、Kernel Streaming服务驱动程序特权提升漏洞(CVE-2024-38245)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38245

安恒CERT编号

DM-202406-001709

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


14、Win32k特权提升漏洞(CVE-2024-38246)

漏洞类型

权限提升

CVSS3.1评分

7

CVE编号

CVE-2024-38246

安恒CERT编号

DM-202406-001710

影响主体

Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)

所需权限(PR)

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


15、Windows Graphics Component特权提升漏洞(CVE-2024-38247)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38247

安恒CERT编号

DM-202406-001711

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


16、Windows Graphics Component特权提升漏洞(CVE-2024-38249)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38249

安恒CERT编号

DM-202406-001713

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)

无需任何权限

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


17、Windows Win32 Kernel Subsystem特权提升漏洞(CVE-2024-38252)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38252

安恒CERT编号

DM-202406-001716

影响主体

Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


18、Windows Win32 Kernel Subsystem特权提升漏洞(CVE-2024-38253)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-38253

安恒CERT编号

DM-202406-001717

影响主体

Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


19、Windows Setup and Deployment特权提升漏洞(CVE-2024-43457)

漏洞类型

权限提升

CVSS3.1评分

7.8

CVE编号

CVE-2024-43457

安恒CERT编号

DM-202406-001545

影响主体

Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


20、Windows MSHTML Platform欺骗漏洞(CVE-2024-43461)

漏洞类型

欺骗漏洞

CVSS3.1评分

8.8

CVE编号

CVE-2024-43461

安恒CERT编号

DM-202406-001732

影响主体

Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 24H2 for ARM64-based Systems
Windows 11 Version 24H2 for x64-based Systems
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

CVSS向量

访问途径(AV)

网络

攻击复杂度(AC)


所需权限(PR)

无需任何权限

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


21、Microsoft SharePoint Server远程代码执行漏洞(CVE-2024-43464)

漏洞类型

远程代码执行

CVSS3.1评分

7.2

CVE编号

CVE-2024-43464

安恒CERT编号

DM-202406-001594

影响主体

Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2019
Microsoft SharePoint Server Subscription Edition

CVSS向量

访问途径(AV)

本地

攻击复杂度(AC)


所需权限(PR)


用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


22、Microsoft Windows Update远程代码执行漏洞(CVE-2024-43491)

危害等级

严重

CVSS3.1评分

9.8

CVE编号

CVE-2024-43491

安恒CERT编号

DM-202406-001603

漏洞描述

该漏洞是由于微软回滚了Windows 10, version 1507(Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB)上可选组件的一些漏洞修复补丁导致的,影响 March 12, 2024—KB5035858 (OS Build 10240.20526) - August 2024 补丁的系统环境。
目前仅有Windows 10 (version 1507) (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) 且启用以下可选组件的环境受影响:
Active Directory Lightweight Directory Services
Administrative Tools
ASP.NET 4.6
Internet Explorer 11
Internet Information Services
LPD Print Service
Microsoft Message Queue (MSMQ) Server Core
MSMQ HTTP Support
MultiPoint Connector
SMB 1.0/CIFS File Sharing Support
Windows Fax and Scan
Windows Media Player
Work Folders Client
XPS Viewer
其他 Windows 10 版本自 November 2015 后不受影响。

CVSS向量

访问途径(AV)

网络

攻击复杂度(AC)


所需权限(PR)

无需任何权限

用户交互(UI)

不需要用户交互

影响范围 (S)

不变

机密性影响 (C)


完整性影响 (I)


可用性影响 (A)


参考链接

https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-43491

1 1



03

修复方案



官方修复方案:

目前微软针对支持的产品已发布升级补丁修复了上述漏洞,请用户参考官方通告及时下载更新补丁。补丁获取:https://msrc.microsoft.com/update-guide/vulnerability
Windows 更新:

自动更新:Microsoft Update默认启用,当系统检测到可用更新时,将会自动下载更新并在下一次启动时安装。

手动更新:

1、点击“开始菜单”或按Windows快捷键,点击进入“设置”。

2、选择“更新和安全”,进入“Windows更新”(Windows 8、Windows 8.1、Windows Server 2012以及Windows Server 2012 R2可通过控制面板进入“Windows更新”,具体步骤为“控制面板”->“系统和安全”->“Windows更新”)。

3、选择“检查更新”,等待系统将自动检查并下载可用更新。

4、重启计算机,安装更新系统重新启动后,可通过进入“Windows更新”->“查看更新历史记录”查看是否成功安装了更新。


04

参考资料


https://msrc.microsoft.com/update-guide/releaseNote/2024-Sep


05

技术支持


如有漏洞相关需求支持请联系400-6059-110获取相关能力支撑。

安恒信息CERT
安恒应急响应中心为客户提供最精准预警通告,同时提供漏洞在客户应用系统危害、影响范围及修补方案等信息。公司产品漏洞提交请联系:400 6059 110, 或邮件联系:src@dbappsecurity.com.cn。
 最新文章