Key Takeaways:
- Microsoft’s March 2024 Patch Tuesday updates for Windows 11 and Windows 10 addressed two critical Hyper-V vulnerabilities.
- Microsoft has also fixed a remote code execution vulnerability in Microsoft Exchange.
- Microsoft introduced quality and experience updates, such as support for USB 80Gbps and improved cellular to Wi-Fi switching reliability.
Microsoft released yesterday the March 2024 Patch Tuesday updates for Windows 11 and Windows 10 devices. The latest update includes fixes for two critical vulnerabilities in the Windows Hyper-V virtualization technology.
This month’s Patch Tuesday updates address 60 security flaws in Windows and other components. There are 18 remote code execution (RCE) vulnerabilities and several privilege escalation flaws that target Windows PCs.
The most critical vulnerabilities fixed in the March 2024 Patch Tuesday updates are listed below:
You can find the full list of CVEs included in this month’s Patch Tuesday below:
Product | Impact | Max Severity | Article | Download | Build Number | Details |
Microsoft Visual Studio 2022 version 17.4 | Denial of Service | Important | Release Notes | Security Update | 17.4.17 | CVE-2024-26190 |
Windows 11 Version 23H2 for x64-based Systems | Remote Code Execution | Important | 5035853 | Security Update | 10.0.22631.3296 | CVE-2024-21430 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Important | 5035856 | Security Update | 10.0.25398.763 | CVE-2024-21430 |
Windows 11 Version 23H2 for ARM64-based Systems | Remote Code Execution | Important | 5035853 | Security Update | 10.0.22631.3296 | CVE-2024-21430 |
Windows Server 2012 R2 (Server Core installation) | Information Disclosure | Important | 5035885 | Monthly Rollup | 6.3.9600.21871 | CVE-2023-28746 |
Windows Server 2012 R2 | Information Disclosure | Important | 5035885 | Monthly Rollup | 6.3.9600.21871 | CVE-2023-28746 |
Windows Server 2012 (Server Core installation) | Information Disclosure | Important | 5035930 | Monthly Rollup | 6.2.9200.24768 | CVE-2023-28746 |
Windows Server 2012 | Information Disclosure | Important | 5035930 | Monthly Rollup | 6.2.9200.24768 | CVE-2023-28746 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Information Disclosure | Important | 5035888 | Monthly Rollup | 6.1.7601.27017 | CVE-2023-28746 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Information Disclosure | Important | 5035919 | Security Only | 6.1.7601.27017 | CVE-2023-28746 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Information Disclosure | Important | 5035888 | Monthly Rollup | 6.1.7601.27017 | CVE-2023-28746 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Information Disclosure | Important | 5035919 | Security Only | 6.1.7601.27017 | CVE-2023-28746 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5035920 | Monthly Rollup | 6.0.6003.22567 | CVE-2023-28746 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5035933 | Security Only | 6.0.6003.22567 | CVE-2023-28746 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Information Disclosure | Important | 5035920 | Monthly Rollup | 6.0.6003.22567 | CVE-2023-28746 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Information Disclosure | Important | 5035933 | Security Only | 6.0.6003.22567 | CVE-2023-28746 |
Windows Server 2016 (Server Core installation) | Information Disclosure | Important | 5035855 | Security Update | 10.0.14393.6796 | CVE-2023-28746 |
Windows Server 2016 | Information Disclosure | Important | 5035855 | Security Update | 10.0.14393.6796 | CVE-2023-28746 |
Windows 10 Version 1607 for x64-based Systems | Information Disclosure | Important | 5035855 | Security Update | 10.0.14393.6796 | CVE-2023-28746 |
Windows 10 Version 1607 for 32-bit Systems | Information Disclosure | Important | 5035855 | Security Update | 10.0.14393.6796 | CVE-2023-28746 |
Windows 10 for x64-based Systems | Information Disclosure | Important | 5035858 | Security Update | 10.0.10240.20526 | CVE-2023-28746 |
Windows 10 for 32-bit Systems | Information Disclosure | Important | 5035858 | Security Update | 10.0.10240.20526 | CVE-2023-28746 |
Windows 10 Version 22H2 for 32-bit Systems | Information Disclosure | Important | 5035845 | Security Update | 10.0.19045.4170 | CVE-2023-28746 |
Windows 10 Version 22H2 for x64-based Systems | Information Disclosure | Important | 5035845 | Security Update | 10.0.19045.4170 | CVE-2023-28746 |
Windows 11 Version 22H2 for x64-based Systems | Information Disclosure | Important | 5035853 | Security Update | 10.0.22621.3296 | CVE-2023-28746 |
Windows 10 Version 22H2 for ARM64-based Systems | Information Disclosure | Important | 5035845 | Security Update | 10.0.19045.4170 | CVE-2024-26174 |
Windows 11 Version 22H2 for ARM64-based Systems | Information Disclosure | Important | 5035853 | Security Update | 10.0.22621.3296 | CVE-2024-26174 |
Windows 10 Version 21H2 for x64-based Systems | Information Disclosure | Important | 5035845 | Security Update | 10.0.19044.4170 | CVE-2024-26174 |
Windows 10 Version 21H2 for ARM64-based Systems | Information Disclosure | Important | 5035845 | Security Update | 10.0.19044.4170 | CVE-2024-26174 |
Windows 10 Version 21H2 for 32-bit Systems | Information Disclosure | Important | 5035845 | Security Update | 10.0.19044.4170 | CVE-2024-26174 |
Windows 11 version 21H2 for ARM64-based Systems | Information Disclosure | Important | 5035854 | Security Update | 10.0.22000.2836 | CVE-2024-26174 |
Windows 11 version 21H2 for x64-based Systems | Information Disclosure | Important | 5035854 | Security Update | 10.0.22000.2836 | CVE-2024-26174 |
Windows Server 2022 (Server Core installation) | Information Disclosure | Important | 5035857 | Security Update | 10.0.20348.2340 | CVE-2024-26174 |
Windows Server 2022 (Server Core installation) | Information Disclosure | Important | 5035959 | SecurityHotpatchUpdate | 10.0.20348.2333 | CVE-2024-26174 |
Windows Server 2022 | Information Disclosure | Important | 5035857 | Security Update | 10.0.20348.2340 | CVE-2024-26174 |
Windows Server 2022 | Information Disclosure | Important | 5035959 | SecurityHotpatchUpdate | 10.0.20348.2333 | CVE-2024-26174 |
Windows Server 2019 (Server Core installation) | Information Disclosure | Important | 5035849 | Security Update | 10.0.17763.5576 | CVE-2024-26174 |
Windows Server 2019 | Information Disclosure | Important | 5035849 | Security Update | 10.0.17763.5576 | CVE-2024-26174 |
Windows 10 Version 1809 for ARM64-based Systems | Information Disclosure | Important | 5035849 | Security Update | 10.0.17763.5576 | CVE-2024-26174 |
Windows 10 Version 1809 for x64-based Systems | Information Disclosure | Important | 5035849 | Security Update | 10.0.17763.5576 | CVE-2024-26174 |
Windows 10 Version 1809 for 32-bit Systems | Information Disclosure | Important | 5035849 | Security Update | 10.0.17763.5576 | CVE-2024-26174 |
Software for Open Networking in the Cloud (SONiC) 202012 | Elevation of Privilege | Important | Release Notes | Security Update | 20201231.96 | CVE-2024-21418 |
Software for Open Networking in the Cloud (SONiC) 201811 | Elevation of Privilege | Important | Release Notes | Security Update | 20181130.106 | CVE-2024-21418 |
Software for Open Networking in the Cloud (SONiC) 201911 | Elevation of Privilege | Important | Release Notes | Security Update | 20191130.89 | CVE-2024-21418 |
Log Analytics Agent | Elevation of Privilege | Important | Release Notes | Security Update | OMS Agent for Linux GA v1.19.0 | CVE-2024-21330 |
Azure Security Center | Elevation of Privilege | Important | Release Notes | Security Update | OMS Agent for Linux GA 1.19.0 | CVE-2024-21330 |
Visual Studio Code | Elevation of Privilege | Important | Release Notes | Security Update | 1.87.2 | CVE-2024-26165 |
Skype for Consumer | Remote Code Execution | Important | Release Notes | Security Update | 8.113 | CVE-2024-21411 |
.NET 8.0 | Denial of Service | Important | 5036452 | Security Update | 8.0.3 | CVE-2024-26190 |
.NET 7.0 | Denial of Service | Important | 5036451 | Monthly Rollup | 7.0.17 | CVE-2024-26190 |
Microsoft Visual Studio 2022 version 17.8 | Denial of Service | Important | Release Notes | Security Update | 17.8.8 | CVE-2024-26190 |
Microsoft Visual Studio 2022 version 17.6 | Denial of Service | Important | Release Notes | Security Update | 17.6.13 | CVE-2024-26190 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5035920 | Monthly Rollup | 6.0.6003.22567 | CVE-2024-26161 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5035933 | Security Only | 6.0.6003.22567 | CVE-2024-26161 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5035920 | Monthly Rollup | 6.0.6003.22567 | CVE-2024-26161 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Important | 5035933 | Security Only | 6.0.6003.22567 | CVE-2024-26161 |
Microsoft Outlook for Android | Information Disclosure | Important | Release Notes | Security Update | 4.2404.0 | CVE-2024-26204 |
Azure Data Studio | Elevation of Privilege | Important | Release Notes | Security Update | 1.48.0 | CVE-2024-26203 |
Microsoft Teams for Android | Information Disclosure | Important | Release Notes | Security Update | 1.0.0.2024022302 | CVE-2024-21448 |
Microsoft SharePoint Server Subscription Edition | Remote Code Execution | Important | 5002564 | Security Update | 16.0.17328.20136 | CVE-2024-21426 |
Microsoft SharePoint Server 2019 | Remote Code Execution | Important | 5002562 | Security Update | 16.0.10408.20000 | CVE-2024-21426 |
Microsoft SharePoint Enterprise Server 2016 | Remote Code Execution | Important | 5002559 | Security Update | 16.0.5439.1000 | CVE-2024-21426 |
Microsoft Dynamics 365 (on-premises) version 9.1 | Spoofing | Important | 5035697 | Security Update | 9.1.26 | CVE-2024-21419 |
Operations Management Suite Agent for Linux (OMS) | Elevation of Privilege | Important | Release Notes | Security Update | 1.8.1-0 | CVE-2024-21330 |
Software for Open Networking in the Cloud (SONiC) 202205 | Elevation of Privilege | Important | Release Notes | Security Update | 20220531.26 | CVE-2024-21418 |
Open Management Infrastructure | Remote Code Execution | Important | Release Notes | Security Update | OMI version 1.8.1-0 | CVE-2024-21334 |
Microsoft Authenticator | Elevation of Privilege | Important | Release Notes | Security Update | 6.2401.0617 | CVE-2024-21390 |
Azure Kubernetes Service Confidential Containers | Elevation of Privilege | Important | Release Notes | Security Update | 0.3.3 | CVE-2024-21400 |
Container Monitoring Solution | Elevation of Privilege | Important | Release Notes | Security Update | microsoft-oms-latest with full ID: sha256:855bfeb0 | CVE-2024-21330 |
Azure Sentinel | Elevation of Privilege | Important | Release Notes | Security Update | OMS Agent for Linux GA v1.19.0 | CVE-2024-21330 |
Azure Automation Update Management | Elevation of Privilege | Important | Release Notes | Security Update | OMS Agent for Linux GA v1.19.0 | CVE-2024-21330 |
Azure Automation | Elevation of Privilege | Important | Release Notes | Security Update | OMS Agent for Linux GA 1.19.0 | CVE-2024-21330 |
SQL Server backend for Django | Remote Code Execution | Important | Release Notes | Security Update | 1.4.1 | CVE-2024-26164 |
Microsoft Visual Studio 2022 version 17.9 | Denial of Service | Important | Release Notes | Security Update | 17.9.3 | CVE-2024-26190 |
Intune Company Portal for Android | Elevation of Privilege | Important | Release Notes | Security Update | 2402 | CVE-2024-26201 |
Microsoft Exchange Server 2016 Cumulative Update 23 | Remote Code Execution | Important | 5036386 | Security Update | 15.01.2507.037 | CVE-2024-26198 |
Microsoft Exchange Server 2019 Cumulative Update 13 | Remote Code Execution | Important | 5036402 | Security Update | 15.02.1258.032 | CVE-2024-26198 |
Microsoft Exchange Server 2019 Cumulative Update 14 | Remote Code Execution | Important | 5036401 | Security Update | 15.02.1544.009 | CVE-2024-26198 |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Elevation of Privilege | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2024-26199 |
Azure SDK | Spoofing | Important | Release Notes | Security Update | 1.29.5 | CVE-2024-21421 |
System Center Operations Manager (SCOM) 2022 | Remote Code Execution | Important | Release Notes | Security Update | 10.22.1070.0 | CVE-2024-21334 |
System Center Operations Manager (SCOM) 2019 | Remote Code Execution | Important | Release Notes | Security Update | 10.19.1253.0 | CVE-2024-21334 |
Windows Defender Antimalware Platform | Security Feature Bypass | Important | Release Notes | Security Update | 4.18.24010.12 | CVE-2024-20671 |
Microsoft released the KB5035853 update for Windows 11 versions 23H2 and 22H2. This release allows users to edit photos taken from their Android phones using the Snipping tool. It should make it easier for users to share the photos with their friends and colleagues. This month’s update also brings support for USB 80Gbps to Windows 11 devices.
Moreover, the latest update improves the reliability of cellular to Wi-Fi switching for Windows 11 machines. Microsoft has also fixed a bug that was previously preventing Windows devices connected to external devices from going to sleep mode.
For Windows 10 users, Microsoft has updated the Windows Share window with new sharing options for Gmail, WhatsApp, LinkedIn, and Facebook. There are also reliability enhancements for secondary drive storage for games.
Microsoft advises organizations to conduct comprehensive testing prior to deploying monthly patches in production environments. This is crucial as it helps to ensure that the updates do not cause any unexpected issues or disruptions to the systems. However, IT administrators should not delay deployment to the extent that it exposes the organization to increased risk.
A recommended best practice is to back up systems before applying updates to minimize unexpected post-update issues. This approach helps enterprise customers to ensure minimal downtime and disruption to critical operations.
There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.