March 2024 Patch Tuesday Updates Fix Critical Hyper-V Vulnerabilities

Published: Mar 12, 2024

Windows-11-notebook-tablet

SHARE ARTICLE

Key Takeaways:

  • Microsoft’s March 2024 Patch Tuesday updates for Windows 11 and Windows 10 addressed two critical Hyper-V vulnerabilities.
  • Microsoft has also fixed a remote code execution vulnerability in Microsoft Exchange.
  • Microsoft introduced quality and experience updates, such as support for USB 80Gbps and improved cellular to Wi-Fi switching reliability.

Microsoft released yesterday the March 2024 Patch Tuesday updates for Windows 11 and Windows 10 devices. The latest update includes fixes for two critical vulnerabilities in the Windows Hyper-V virtualization technology.

This month’s Patch Tuesday updates address 60 security flaws in Windows and other components. There are 18 remote code execution (RCE) vulnerabilities and several privilege escalation flaws that target Windows PCs.

60 vulnerabilities fixed in the March 2024 Patch Tuesday updates

The most critical vulnerabilities fixed in the March 2024 Patch Tuesday updates are listed below:

  • CVE-2024-21407: The remote-code execution vulnerability could allow hackers to execute arbitrary code on the compromised virtual machines hosted on the Hyper-V server. A successful attack could compromise the availability, integrity, and confidentiality of the system.
  • CVE-2024-21408: The denial-of-service vulnerability could let hackers crash the Hyper-V service. Microsoft did not provide additional details about the nature of the flaw, but exploitation only requires basic privileges to disrupt the system.
  • CVE-2024-21390: This is an elevation of privilege flaw in the Microsoft Authenticator app with a CVSS score of 7.1. It could enable hackers to gain unauthorized access to multi-factor authentication (MFA) codes. The threat actors could also steal data from sensitive accounts and redirect users to phishing websites.
  • CVE-2024-26198: This remote code execution vulnerability in Microsoft Exchange is rated important with an 8.8 CVSS rating. The attacker could exploit the flaw by placing a malicious file in an online directory and tricking users to open it.

You can find the full list of CVEs included in this month’s Patch Tuesday below:

ProductImpactMax SeverityArticleDownloadBuild NumberDetails
Microsoft Visual Studio 2022 version 17.4Denial of ServiceImportantRelease NotesSecurity Update17.4.17CVE-2024-26190
Windows 11 Version 23H2 for x64-based SystemsRemote Code ExecutionImportant5035853Security Update10.0.22631.3296CVE-2024-21430
Windows Server 2022, 23H2 Edition (Server Core installation)Remote Code ExecutionImportant5035856Security Update10.0.25398.763CVE-2024-21430
Windows 11 Version 23H2 for ARM64-based SystemsRemote Code ExecutionImportant5035853Security Update10.0.22631.3296CVE-2024-21430
Windows Server 2012 R2 (Server Core installation)Information DisclosureImportant5035885Monthly Rollup6.3.9600.21871CVE-2023-28746
Windows Server 2012 R2Information DisclosureImportant5035885Monthly Rollup6.3.9600.21871CVE-2023-28746
Windows Server 2012 (Server Core installation)Information DisclosureImportant5035930Monthly Rollup6.2.9200.24768CVE-2023-28746
Windows Server 2012Information DisclosureImportant5035930Monthly Rollup6.2.9200.24768CVE-2023-28746
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Information DisclosureImportant5035888Monthly Rollup6.1.7601.27017CVE-2023-28746
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Information DisclosureImportant5035919Security Only6.1.7601.27017CVE-2023-28746
Windows Server 2008 R2 for x64-based Systems Service Pack 1Information DisclosureImportant5035888Monthly Rollup6.1.7601.27017CVE-2023-28746
Windows Server 2008 R2 for x64-based Systems Service Pack 1Information DisclosureImportant5035919Security Only6.1.7601.27017CVE-2023-28746
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Information DisclosureImportant5035920Monthly Rollup6.0.6003.22567CVE-2023-28746
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Information DisclosureImportant5035933Security Only6.0.6003.22567CVE-2023-28746
Windows Server 2008 for x64-based Systems Service Pack 2Information DisclosureImportant5035920Monthly Rollup6.0.6003.22567CVE-2023-28746
Windows Server 2008 for x64-based Systems Service Pack 2Information DisclosureImportant5035933Security Only6.0.6003.22567CVE-2023-28746
Windows Server 2016 (Server Core installation)Information DisclosureImportant5035855Security Update10.0.14393.6796CVE-2023-28746
Windows Server 2016Information DisclosureImportant5035855Security Update10.0.14393.6796CVE-2023-28746
Windows 10 Version 1607 for x64-based SystemsInformation DisclosureImportant5035855Security Update10.0.14393.6796CVE-2023-28746
Windows 10 Version 1607 for 32-bit SystemsInformation DisclosureImportant5035855Security Update10.0.14393.6796CVE-2023-28746
Windows 10 for x64-based SystemsInformation DisclosureImportant5035858Security Update10.0.10240.20526CVE-2023-28746
Windows 10 for 32-bit SystemsInformation DisclosureImportant5035858Security Update10.0.10240.20526CVE-2023-28746
Windows 10 Version 22H2 for 32-bit SystemsInformation DisclosureImportant5035845Security Update10.0.19045.4170CVE-2023-28746
Windows 10 Version 22H2 for x64-based SystemsInformation DisclosureImportant5035845Security Update10.0.19045.4170CVE-2023-28746
Windows 11 Version 22H2 for x64-based SystemsInformation DisclosureImportant5035853Security Update10.0.22621.3296CVE-2023-28746
Windows 10 Version 22H2 for ARM64-based SystemsInformation DisclosureImportant5035845Security Update10.0.19045.4170CVE-2024-26174
Windows 11 Version 22H2 for ARM64-based SystemsInformation DisclosureImportant5035853Security Update10.0.22621.3296CVE-2024-26174
Windows 10 Version 21H2 for x64-based SystemsInformation DisclosureImportant5035845Security Update10.0.19044.4170CVE-2024-26174
Windows 10 Version 21H2 for ARM64-based SystemsInformation DisclosureImportant5035845Security Update10.0.19044.4170CVE-2024-26174
Windows 10 Version 21H2 for 32-bit SystemsInformation DisclosureImportant5035845Security Update10.0.19044.4170CVE-2024-26174
Windows 11 version 21H2 for ARM64-based SystemsInformation DisclosureImportant5035854Security Update10.0.22000.2836CVE-2024-26174
Windows 11 version 21H2 for x64-based SystemsInformation DisclosureImportant5035854Security Update10.0.22000.2836CVE-2024-26174
Windows Server 2022 (Server Core installation)Information DisclosureImportant5035857Security Update10.0.20348.2340CVE-2024-26174
Windows Server 2022 (Server Core installation)Information DisclosureImportant5035959SecurityHotpatchUpdate10.0.20348.2333CVE-2024-26174
Windows Server 2022Information DisclosureImportant5035857Security Update10.0.20348.2340CVE-2024-26174
Windows Server 2022Information DisclosureImportant5035959SecurityHotpatchUpdate10.0.20348.2333CVE-2024-26174
Windows Server 2019 (Server Core installation)Information DisclosureImportant5035849Security Update10.0.17763.5576CVE-2024-26174
Windows Server 2019Information DisclosureImportant5035849Security Update10.0.17763.5576CVE-2024-26174
Windows 10 Version 1809 for ARM64-based SystemsInformation DisclosureImportant5035849Security Update10.0.17763.5576CVE-2024-26174
Windows 10 Version 1809 for x64-based SystemsInformation DisclosureImportant5035849Security Update10.0.17763.5576CVE-2024-26174
Windows 10 Version 1809 for 32-bit SystemsInformation DisclosureImportant5035849Security Update10.0.17763.5576CVE-2024-26174
Software for Open Networking in the Cloud (SONiC) 202012Elevation of PrivilegeImportantRelease NotesSecurity Update20201231.96CVE-2024-21418
Software for Open Networking in the Cloud (SONiC) 201811Elevation of PrivilegeImportantRelease NotesSecurity Update20181130.106CVE-2024-21418
Software for Open Networking in the Cloud (SONiC) 201911Elevation of PrivilegeImportantRelease NotesSecurity Update20191130.89CVE-2024-21418
Log Analytics AgentElevation of PrivilegeImportantRelease NotesSecurity UpdateOMS Agent for Linux GA v1.19.0CVE-2024-21330
Azure Security CenterElevation of PrivilegeImportantRelease NotesSecurity UpdateOMS Agent for Linux GA 1.19.0CVE-2024-21330
Visual Studio CodeElevation of PrivilegeImportantRelease NotesSecurity Update1.87.2CVE-2024-26165
Skype for ConsumerRemote Code ExecutionImportantRelease NotesSecurity Update8.113CVE-2024-21411
.NET 8.0Denial of ServiceImportant5036452Security Update8.0.3CVE-2024-26190
.NET 7.0Denial of ServiceImportant5036451Monthly Rollup7.0.17CVE-2024-26190
Microsoft Visual Studio 2022 version 17.8Denial of ServiceImportantRelease NotesSecurity Update17.8.8CVE-2024-26190
Microsoft Visual Studio 2022 version 17.6Denial of ServiceImportantRelease NotesSecurity Update17.6.13CVE-2024-26190
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5035920Monthly Rollup6.0.6003.22567CVE-2024-26161
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5035933Security Only6.0.6003.22567CVE-2024-26161
Windows Server 2008 for 32-bit Systems Service Pack 2Remote Code ExecutionImportant5035920Monthly Rollup6.0.6003.22567CVE-2024-26161
Windows Server 2008 for 32-bit Systems Service Pack 2Remote Code ExecutionImportant5035933Security Only6.0.6003.22567CVE-2024-26161
Microsoft Outlook for AndroidInformation DisclosureImportantRelease NotesSecurity Update4.2404.0CVE-2024-26204
Azure Data StudioElevation of PrivilegeImportantRelease NotesSecurity Update1.48.0CVE-2024-26203
Microsoft Teams for AndroidInformation DisclosureImportantRelease NotesSecurity Update1.0.0.2024022302CVE-2024-21448
Microsoft SharePoint Server Subscription EditionRemote Code ExecutionImportant5002564Security Update16.0.17328.20136CVE-2024-21426
Microsoft SharePoint Server 2019Remote Code ExecutionImportant5002562Security Update16.0.10408.20000CVE-2024-21426
Microsoft SharePoint Enterprise Server 2016Remote Code ExecutionImportant5002559Security Update16.0.5439.1000CVE-2024-21426
Microsoft Dynamics 365 (on-premises) version 9.1SpoofingImportant5035697Security Update9.1.26CVE-2024-21419
Operations Management Suite Agent for Linux (OMS)Elevation of PrivilegeImportantRelease NotesSecurity Update1.8.1-0CVE-2024-21330
Software for Open Networking in the Cloud (SONiC) 202205Elevation of PrivilegeImportantRelease NotesSecurity Update20220531.26CVE-2024-21418
Open Management InfrastructureRemote Code ExecutionImportantRelease NotesSecurity UpdateOMI version 1.8.1-0CVE-2024-21334
Microsoft AuthenticatorElevation of PrivilegeImportantRelease NotesSecurity Update6.2401.0617CVE-2024-21390
Azure Kubernetes Service Confidential ContainersElevation of PrivilegeImportantRelease NotesSecurity Update0.3.3CVE-2024-21400
Container Monitoring SolutionElevation of PrivilegeImportantRelease NotesSecurity Updatemicrosoft-oms-latest with full ID: sha256:855bfeb0CVE-2024-21330
Azure SentinelElevation of PrivilegeImportantRelease NotesSecurity UpdateOMS Agent for Linux GA v1.19.0CVE-2024-21330
Azure Automation Update ManagementElevation of PrivilegeImportantRelease NotesSecurity UpdateOMS Agent for Linux GA v1.19.0CVE-2024-21330
Azure AutomationElevation of PrivilegeImportantRelease NotesSecurity UpdateOMS Agent for Linux GA 1.19.0CVE-2024-21330
SQL Server backend for DjangoRemote Code ExecutionImportantRelease NotesSecurity Update1.4.1CVE-2024-26164
Microsoft Visual Studio 2022 version 17.9Denial of ServiceImportantRelease NotesSecurity Update17.9.3CVE-2024-26190
Intune Company Portal for AndroidElevation of PrivilegeImportantRelease NotesSecurity Update2402CVE-2024-26201
Microsoft Exchange Server 2016 Cumulative Update 23Remote Code ExecutionImportant5036386Security Update15.01.2507.037CVE-2024-26198
Microsoft Exchange Server 2019 Cumulative Update 13Remote Code ExecutionImportant5036402Security Update15.02.1258.032CVE-2024-26198
Microsoft Exchange Server 2019 Cumulative Update 14Remote Code ExecutionImportant5036401Security Update15.02.1544.009CVE-2024-26198
Microsoft 365 Apps for Enterprise for 64-bit SystemsElevation of PrivilegeImportantClick to RunSecurity Updatehttps://aka.ms/OfficeSecurityReleasesCVE-2024-26199
Azure SDKSpoofingImportantRelease NotesSecurity Update1.29.5CVE-2024-21421
System Center Operations Manager (SCOM) 2022Remote Code ExecutionImportantRelease NotesSecurity Update10.22.1070.0CVE-2024-21334
System Center Operations Manager (SCOM) 2019Remote Code ExecutionImportantRelease NotesSecurity Update10.19.1253.0CVE-2024-21334
Windows Defender Antimalware PlatformSecurity Feature BypassImportantRelease NotesSecurity Update4.18.24010.12CVE-2024-20671

Quality and experience updates

Microsoft released the KB5035853 update for Windows 11 versions 23H2 and 22H2. This release allows users to edit photos taken from their Android phones using the Snipping tool. It should make it easier for users to share the photos with their friends and colleagues. This month’s update also brings support for USB 80Gbps to Windows 11 devices.

Moreover, the latest update improves the reliability of cellular to Wi-Fi switching for Windows 11 machines. Microsoft has also fixed a bug that was previously preventing Windows devices connected to external devices from going to sleep mode.

For Windows 10 users, Microsoft has updated the Windows Share window with new sharing options for Gmail, WhatsApp, LinkedIn, and Facebook. There are also reliability enhancements for secondary drive storage for games.

Windows Update testing and best practices

Microsoft advises organizations to conduct comprehensive testing prior to deploying monthly patches in production environments. This is crucial as it helps to ensure that the updates do not cause any unexpected issues or disruptions to the systems. However, IT administrators should not delay deployment to the extent that it exposes the organization to increased risk.

A recommended best practice is to back up systems before applying updates to minimize unexpected post-update issues. This approach helps enterprise customers to ensure minimal downtime and disruption to critical operations.

There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.

SHARE ARTICLE