Last Update: Nov 19, 2024 | Published: Jul 10, 2024
Key Takeaways:
- Microsoft addressed 142 security vulnerabilities in the July 2024 Patch Tuesday updates, including five critical ones.
- These vulnerabilities impact various components such as Windows Hyper-V, Windows MSHTML platform, .NET version 8.0, Visual Studio 2022, Microsoft SharePoint Server, and Windows Remote Desktop Licensing Service.
- Windows 11 users received new features and bug fixes, including a Copilot app, support for new file compression formats, a new account manager in the Start menu, enhancements for File Explorer, Windows Share, and the Snipping tool.
Microsoft has released the July 2024 Patch Tuesday updates for all supported versions of Windows 11 and Windows 10. This month, Microsoft fixed 142 security vulnerabilities in Windows, Office, and other components, and users can also expect the usual bug fixes and quality improvements.
Microsoft has rolled out a couple of new features, improvements, and bug fixes for Windows 11 users. The company is also reminding customers that Windows 11 version 22H2 will reach end of support on October 8, 2024. Microsoft advises users to switch to a newer version of Windows to continue receiving updates.
As pointed out by the Zero Day Initiative, Microsoft released 142 security patches yesterday, with fixes for five critical vulnerabilities.
Here’s the full list of CVEs Microsoft released this month:
Release date | Product | Platform | Impact | Max Severity | Article | Download | Build Number | Details |
Jul 9, 2024 | Windows 11 Version 22H2 for x64-based Systems | Denial of Service | Important | 5040442 | Security Update | 10.0.22621.3880 | CVE-2024-38027 | |
Jul 9, 2024 | Windows 11 Version 22H2 for ARM64-based Systems | Denial of Service | Important | 5040442 | Security Update | 10.0.22621.3880 | CVE-2024-38027 | |
Jul 9, 2024 | Windows 10 Version 21H2 for x64-based Systems | Denial of Service | Important | 5040427 | Security Update | 10.0.19044.4651 | CVE-2024-38027 | |
Jul 9, 2024 | Windows 10 Version 21H2 for ARM64-based Systems | Denial of Service | Important | 5040427 | Security Update | 10.0.19044.4651 | CVE-2024-38027 | |
Jul 9, 2024 | Windows 10 Version 21H2 for 32-bit Systems | Denial of Service | Important | 5040427 | Security Update | 10.0.19044.4651 | CVE-2024-38027 | |
Jul 9, 2024 | Windows 11 version 21H2 for ARM64-based Systems | Denial of Service | Important | 5040431 | Security Update | 10.0.22000.3079 | CVE-2024-38027 | |
Jul 9, 2024 | Windows Server 2012 (Server Core installation) | Information Disclosure | Important | 5040485 | Monthly Rollup | 6.2.9200.24975 | CVE-2024-38017 | |
Jul 9, 2024 | Windows Server 2012 | Information Disclosure | Important | 5040485 | Monthly Rollup | 6.2.9200.24975 | CVE-2024-38017 | |
Jul 9, 2024 | Windows Server 2016 | Information Disclosure | Important | 5040434 | Security Update | 10.0.14393.7159 | CVE-2024-38017 | |
Jul 9, 2024 | Windows 10 Version 1607 for x64-based Systems | Information Disclosure | Important | 5040434 | Security Update | 10.0.14393.7159 | CVE-2024-38017 | |
Jul 9, 2024 | Windows 10 Version 1607 for 32-bit Systems | Information Disclosure | Important | 5040434 | Security Update | 10.0.14393.7159 | CVE-2024-38017 | |
Jul 9, 2024 | Windows 10 for x64-based Systems | Information Disclosure | Important | 5040448 | Security Update | 10.0.10240.20710 | CVE-2024-38017 | |
Jul 9, 2024 | Windows 10 for 32-bit Systems | Information Disclosure | Important | 5040448 | Security Update | 10.0.10240.20710 | CVE-2024-38017 | |
Jul 9, 2024 | Windows Server 2022, 23H2 Edition (Server Core installation) | Information Disclosure | Important | 5040438 | Security Update | 10.0.25398.1009 | CVE-2024-38017 | |
Jul 9, 2024 | Windows 11 Version 23H2 for x64-based Systems | Information Disclosure | Important | 5040442 | Security Update | 10.0.22631.3880 | CVE-2024-38017 | |
Jul 9, 2024 | Windows 11 Version 23H2 for ARM64-based Systems | Information Disclosure | Important | 5040442 | Security Update | 10.0.22631.3880 | CVE-2024-38017 | |
Jul 9, 2024 | Windows Server 2022 | Security Feature Bypass | Important | 5040437 | Security Update | 10.0.20348.2582 | CVE-2024-38011 | |
Jul 9, 2024 | Windows Server 2019 (Server Core installation) | Security Feature Bypass | Important | 5040430 | Security Update | 10.0.17763.6054 | CVE-2024-38011 | |
Jul 9, 2024 | Windows Server 2019 | Security Feature Bypass | Important | 5040430 | Security Update | 10.0.17763.6054 | CVE-2024-38011 | |
Jul 9, 2024 | Windows 10 Version 1809 for ARM64-based Systems | Security Feature Bypass | Important | 5040430 | Security Update | 10.0.17763.6054 | CVE-2024-38011 | |
Jul 9, 2024 | Windows 10 Version 1809 for x64-based Systems | Security Feature Bypass | Important | 5040430 | Security Update | 10.0.17763.6054 | CVE-2024-38011 | |
Jul 9, 2024 | Windows 10 Version 22H2 for 32-bit Systems | Security Feature Bypass | Important | 5040427 | Security Update | 10.0.19045.4651 | CVE-2024-37989 | |
Jul 9, 2024 | Windows 11 version 21H2 for x64-based Systems | Security Feature Bypass | Important | 5040431 | Security Update | 10.0.22000.3079 | CVE-2024-37989 | |
Jul 9, 2024 | Windows Server 2022 (Server Core installation) | Security Feature Bypass | Important | 5040437 | Security Update | 10.0.20348.2582 | CVE-2024-37989 | |
Jul 9, 2024 | Windows 10 Version 1809 for 32-bit Systems | Security Feature Bypass | Important | 5040430 | Security Update | 10.0.17763.6054 | CVE-2024-37989 | |
Jul 9, 2024 | Windows Server 2012 R2 (Server Core installation) | Security Feature Bypass | Important | 5040456 | Monthly Rollup | 6.3.9600.22074 | CVE-2024-37988 | |
Jul 9, 2024 | Windows Server 2012 R2 | Security Feature Bypass | Important | 5040456 | Monthly Rollup | 6.3.9600.22074 | CVE-2024-37988 | |
Jul 9, 2024 | Windows Server 2016 (Server Core installation) | Security Feature Bypass | Important | 5040434 | Security Update | 10.0.14393.7159 | CVE-2024-37988 | |
Jul 9, 2024 | Windows 10 Version 22H2 for ARM64-based Systems | Denial of Service | Important | 5040427 | Security Update | 10.0.19045.4651 | CVE-2024-38068 | |
Jul 9, 2024 | Windows 10 Version 22H2 for x64-based Systems | Denial of Service | Important | 5040427 | Security Update | 10.0.19045.4651 | CVE-2024-38068 | |
Jul 9, 2024 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5040497 | Monthly Rollup | 6.1.7601.27219 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5040498 | Security Only | 6.1.7601.27219 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5040497 | Monthly Rollup | 6.1.7601.27219 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5040498 | Security Only | 6.1.7601.27219 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5040499 | Monthly Rollup | 6.0.6003.22769 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5040490 | Security Only | 6.0.6003.22769 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5040499 | Monthly Rollup | 6.0.6003.22769 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5040490 | Security Only | 6.0.6003.22769 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5040499 | Monthly Rollup | 6.0.6003.22769 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5040490 | Security Only | 6.0.6003.22769 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5040499 | Monthly Rollup | 6.0.6003.22769 | CVE-2024-38057 | |
Jul 9, 2024 | Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5040490 | Security Only | 6.0.6003.22769 | CVE-2024-38057 | |
Jul 9, 2024 | Microsoft Visual Studio 2022 version 17.10 | Denial of Service | Important | Release Notes | Security Update | 17.10.4 | CVE-2024-38095 | |
Jul 9, 2024 | Microsoft Visual Studio 2022 version 17.8 | Denial of Service | Important | Release Notes | Security Update | 17.8.12 | CVE-2024-38095 | |
Jul 9, 2024 | Microsoft Visual Studio 2022 version 17.6 | Denial of Service | Important | Release Notes | Security Update | 17.6.17 | CVE-2024-38095 | |
Jul 9, 2024 | Microsoft Visual Studio 2022 version 17.4 | Denial of Service | Important | Release Notes | Security Update | 17.4.21 | CVE-2024-38095 | |
Jul 9, 2024 | Azure CycleCloud 7.9.5 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.4 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.6 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.2 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.0.1 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.11 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.8 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.10 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Microsoft Defender for IoT | Elevation of Privilege | Important | Release Notes | Security Update | 24.1.4 | CVE-2024-38089 | |
Jul 9, 2024 | .NET 8.0 | Elevation of Privilege | Important | 5041081 | Security Update | 8.0.7 | CVE-2024-38081 | |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.7.2 | Windows Server 2016 | Elevation of Privilege | Important | 5040448 | Security Update | 10.0.10240.20710 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.7.2 | Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5040434 | Security Update | 10.0.14393.7159 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.7.2 | Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5041017 | Security Update | 4.7.2.4101.03 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8 | Windows 11 version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5041020 | Security Update | 4.8.4739.04 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8 | Windows Server 2022 | Elevation of Privilege | Important | 5041016 | Security Update | 4.8.4739.04 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8 | Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5041017 | Security Update | 4.8.4739.04 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.8 | Windows Server 2012 R2 (Server Core installation) | Elevation of Privilege | Important | 5041023 | Monthly Rollup | 4.8.4739.02 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.8 | Windows Server 2012 (Server Core installation) | Elevation of Privilege | Important | 5041022 | Monthly Rollup | 4.8.4739.02 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.8 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5041021 | Monthly Rollup | 4.8.4739.02 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.8 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5041026 | Security Only | 4.8.4739.03 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.8 | Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5039885 | Security Update | 4.8.04739.02 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5.1 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5041021 | Monthly Rollup | 3.5.30729.8971 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5.1 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5041026 | Security Only | 3.5.30729.8971 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 | Windows Server 2012 R2 (Server Core installation) | Elevation of Privilege | Important | 5041023 | Monthly Rollup | 3.5.4101.04 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 | Windows Server 2012 R2 | Elevation of Privilege | Important | 5041022 | Monthly Rollup | 3.5.30729.8971 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 | Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5041024 | Monthly Rollup | 3.5.30729.8972 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 | Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5041027 | Security Only | 3.5.30729.8972 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 | Windows Server 2012 R2 | Elevation of Privilege | Important | 5041023 | Monthly Rollup | 4.7.4101.02 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.0 Service Pack 2 | Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5041024 | Monthly Rollup | 2.0.50727.8977 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.0 Service Pack 2 | Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5041027 | Security Only | 2.0.50727.8977 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 2.0 Service Pack 2 | Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5041024 | Monthly Rollup | 2.0.50727.8977 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 2.0 Service Pack 2 | Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5041027 | Security Only | 2.0.50727.8977 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.6/4.6.2 | Windows 10 for x64-based Systems | Elevation of Privilege | Important | 5040448 | Security Update | 10.0.10240.20710 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.6.2 | Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5041024 | Monthly Rollup | 4.7.4101.01 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.6.2 | Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5041027 | Security Only | 4.7.4101.01 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8.1 | Windows 11 Version 23H2 for x64-based Systems | Elevation of Privilege | Important | 5039895 | Security Update | 4.8.1.9256.03 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8.1 | Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | 5041019 | Security Update | 4.8.1.9256.03 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft 365 Apps for Enterprise for 64-bit Systems | Spoofing | Moderate | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2024-38020 | |
Jul 9, 2024 | Microsoft 365 Apps for Enterprise for 32-bit Systems | Spoofing | Moderate | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2024-38020 | |
Jul 9, 2024 | Microsoft Office 2019 for 64-bit editions | Spoofing | Moderate | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2024-38020 | |
Jul 9, 2024 | Microsoft Office 2019 for 32-bit editions | Spoofing | Moderate | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2024-38020 | |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8.1 | Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5041018 | Security Update | 4.8.1.9256.03 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8.1 | Windows 11 version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | 5041020 | Security Update | 4.8.9256.03 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft SharePoint Server Subscription Edition | Remote Code Execution | Important | 5002606 | Security Update | 16.0.17328.20424 | CVE-2024-38094 | |
Jul 9, 2024 | Microsoft SharePoint Server 2019 | Remote Code Execution | Important | 5002615 | Security Update | 16.0.10412.20001 | CVE-2024-38094 | |
Jul 9, 2024 | Microsoft SharePoint Enterprise Server 2016 | Remote Code Execution | Important | 5002618 | Security Update | 16.0.5456.1000 | CVE-2024-38094 | |
Jul 9, 2024 | Azure CycleCloud 8.5.0 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.4.2 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.4.0 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.4.1 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.3.0 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.2.2 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.1.0 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.2.1 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.1.1 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.0.2 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.7 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5041021 | Monthly Rollup | 4.7.4101.02 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 | Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5041026 | Security Only | 4.7.4101.01 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8.1 | Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5041016 | Security Update | 4.8.1.9256.03 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2 | Windows Server 2012 | Elevation of Privilege | Important | 5041022 | Monthly Rollup | 4.7.4101.02 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft Office 2016 (64-bit edition) | Remote Code Execution | Important | 5002620 | Security Update | 16.0.5456.1000 | CVE-2024-38021 | |
Jul 9, 2024 | Microsoft Office 2016 (32-bit edition) | Remote Code Execution | Important | 5002620 | Security Update | 16.0.5456.1000 | CVE-2024-38021 | |
Jul 9, 2024 | Microsoft Office LTSC 2021 for 32-bit editions | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2024-38021 | |
Jul 9, 2024 | Microsoft Office LTSC 2021 for 64-bit editions | Remote Code Execution | Important | Click to Run | Security Update | https://aka.ms/OfficeSecurityReleases | CVE-2024-38021 | |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.7.2 | Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5041023 | Monthly Rollup | 4.7.4101.02 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8 | Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | 5041019 | Security Update | 4.8.4739.04 | CVE-2024-38081 |
Jul 9, 2024 | Microsoft .NET Framework 3.5 AND 4.8 | Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5041018 | Security Update | 4.8.4739.04 | CVE-2024-38081 |
Jul 9, 2024 | Azure CycleCloud 7.9.9 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.1 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.3 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 7.9.0 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.6.0 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.0.0 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Azure CycleCloud 8.2.0 | Elevation of Privilege | Important | Release Notes | Security Update | 8.6.2 | CVE-2024-38092 | |
Jul 9, 2024 | Microsoft Outlook 2016 (64-bit edition) | Spoofing | Moderate | 5002621 | Security Update | 16.0.5456.1000 | CVE-2024-38020 | |
Jul 9, 2024 | Microsoft Outlook 2016 (32-bit edition) | Spoofing | Moderate | 5002621 | Security Update | 16.0.5456.1000 | CVE-2024-38020 | |
Jul 9, 2024 | Microsoft SQL Server 2019 for x64-based Systems (CU 27) | Remote Code Execution | Important | 5040948 | Security Update | 15.0.4382.1 | CVE-2024-35256 | |
Jul 9, 2024 | Microsoft SQL Server 2022 for x64-based Systems (CU 13) | Remote Code Execution | Important | 5040939 | Security Update | 16.0.4131.2 | CVE-2024-35256 | |
Jul 9, 2024 | Microsoft SQL Server 2022 for x64-based Systems (GDR) | Remote Code Execution | Important | 5040936 | Security Update | 16.0.1121.4 | CVE-2024-35256 | |
Jul 9, 2024 | Microsoft SQL Server 2017 for x64-based Systems (CU 31) | Remote Code Execution | Important | 5040940 | Security Update | 14.0.3471.2 | CVE-2024-35256 | |
Jul 9, 2024 | Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | Remote Code Execution | Important | 5040944 | Security Update | 13.0.7037.1 | CVE-2024-35256 | |
Jul 9, 2024 | Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | Remote Code Execution | Important | 5040946 | Security Update | 13.0.6441.1 | CVE-2024-35256 | |
Jul 9, 2024 | Microsoft SQL Server 2019 for x64-based Systems (GDR) | Remote Code Execution | Important | 5040986 | Security Update | 15.0.2116.2 | CVE-2024-35256 | |
Jul 9, 2024 | Microsoft SQL Server 2017 for x64-based Systems (GDR) | Remote Code Execution | Important | 5040942 | Security Update | 14.0.2056.2 | CVE-2024-35256 | |
Jul 9, 2024 | Microsoft OLE DB Driver 18 for SQL Server | Remote Code Execution | Important | 5040711 | Security Update | 18.7.0004.0 | CVE-2024-37334 | |
Jul 9, 2024 | Microsoft OLE DB Driver 19 for SQL Server | Remote Code Execution | Important | 5040712 | Security Update | 19.3.0005.0 | CVE-2024-37334 | |
Jul 9, 2024 | Azure DevOps Server 2022.1 | Spoofing | Important | Release Notes | Security Update | 20240702.1 | CVE-2024-35267 | |
Jul 9, 2024 | Azure Network Watcher VM Extension for Windows | Elevation of Privilege | Important | Release Notes | Security Update | 1.4.3320.1 | CVE-2024-35261 | |
Jul 9, 2024 | Windows Server 2012 R2 (Server Core installation) | Spoofing | Important | 5040426 | IE Cumulative | 1.001 | CVE-2024-38112 | |
Jul 9, 2024 | Windows Server 2012 R2 | Spoofing | Important | 5040426 | IE Cumulative | 1.001 | CVE-2024-38112 | |
Jul 9, 2024 | Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Spoofing | Important | 5040426 | IE Cumulative | 1.001 | CVE-2024-38112 | |
Jul 9, 2024 | Windows Server 2008 for x64-based Systems Service Pack 2 | Spoofing | Important | 5040426 | IE Cumulative | 1.001 | CVE-2024-38112 | |
Jul 9, 2024 | Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Spoofing | Important | 5040426 | IE Cumulative | 1.001 | CVE-2024-38112 | |
Jul 9, 2024 | Windows Server 2008 for 32-bit Systems Service Pack 2 | Spoofing | Important | 5040426 | IE Cumulative | 1.001 | CVE-2024-38112 | |
Jul 9, 2024 | Azure Kinect SDK | Remote Code Execution | Important | Release Notes | Security Update | 1.4.2 | CVE-2024-38086 | |
Jul 9, 2024 | Microsoft Dynamics 365 (on-premises) version 9.1 | Information Disclosure | Important | 5037940 | Security Update | 9.1.28.09 | CVE-2024-30061 |
Microsoft has released the KB5040435 patch for users running Windows 11 version 24H2. This update addresses a couple of issues, including a bug that was previously preventing the User Account Control (UAC) from prompting for the user’s credentials.
For Windows 11 versions 23H2 and 22H2, the KB5040442 patch brings several new features that are gradually rolling out to all users. These improvements include a new Copilot app, support for new file compression formats, and a new account manager in the Start menu. There are also enhancements for the File Explorer, Windows Share, as well as the Snipping tool.
Lastly, the KB5040427 update is also available for Windows 10 version 22H2. This release also brings the new Copilot app to Windows 10 PCs. Microsoft has also fixed an issue that was preventing actions from an app’s jump list on the taskbar from completing.
Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.
A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.
There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.