Microsoft Releases November 2024 Patch Tuesday Updates for Windows 11 and Windows 10

Microsoft’s November 2024 Patch Tuesday updates fix 89 security vulnerabilities in Windows 10 and 11.

Last Update: Nov 19, 2024 | Published: Nov 13, 2024

Windows update hero image

SHARE ARTICLE

Key Takeaways:

  • Microsoft’s November 2024 Patch Tuesday updates address 89 security vulnerabilities across Windows 10 and 11, including four critical and 84 important ones, with two already being exploited in active attacks.
  • Key vulnerabilities include issues in Windows Task Scheduler, Active Directory Certificate Services, Exchange Server, and Windows Kerberos.
  • The November Patch Tuesday updates also introduce quality improvements, such as enhanced Copilot settings and Windows Sandbox features.

Microsoft released yesterday the November 2024 Patch Tuesday updates for all supported versions of Windows 11 and Windows 10. This month, the company has fixed a total of 89 Windows vulnerabilities, with eight of them more likely to be exploited by attackers.

89 vulnerabilities fixed in the November 2024 Patch Tuesday updates

Among the 89 Windows vulnerabilities Microsoft fixed this month, 4 are rated “Critical,” 84 are rated Important, and one is rated Moderate in severity. However, two vulnerabilities are already being exploited in the wild, and you can find more details below:

  • CVE-2024-49039 – This is a Windows Task Scheduler elevation of privilege vulnerability that lets hackers execute remote procedure calls (RPC) available only to privileged accounts. The CVSS 8.8-rated flaw affects Windows 10 and later versions, including Windows Server 2025.
  • CVE-2024-43451 – This spoofing vulnerability enables hackers to steal a victim’s NTLMv2 hash to validate credentials in Windows environments. This important rated flaw with a CVSS score of 6.5 affects all Windows versions and requires minimal user interaction.
  • CVE-2024-49019 – This elevation-of-privilege vulnerability in Active Directory Certificate Services enables hackers to gain domain administrator access. Microsoft has provided various recommendations to help organizations secure certificate templates.
  • CVE-2024-49040 – This is an Exchange Server spoofing flaw with a CVSS score of 7.5. It could allow cybercriminals to make phishing attempts and send malicious messages to the victims. This security vulnerability affects both Exchange Server 2016 and 2019.
  • CVE-2024-43639 – This is a critical remote code execution (RCE) flaw in Windows Kerberos that could be exploited by an unauthenticated attacker remotely. This bug has a CVSS score of 9.8.

You can find the full list of CVEs released by Microsoft with the November 2024 Patch Tuesday updates below:

ProductImpactMax SeverityArticleDetails
Azure Database for PostgreSQL Flexible Server 12Elevation of PrivilegeImportantRelease NotesCVE-2024-43613
Azure Database for PostgreSQL Flexible Server 13Elevation of PrivilegeImportantRelease NotesCVE-2024-43613
Azure Database for PostgreSQL Flexible Server 14Elevation of PrivilegeImportantRelease NotesCVE-2024-43613
Azure Database for PostgreSQL Flexible Server 15Elevation of PrivilegeImportantRelease NotesCVE-2024-43613
Azure Database for PostgreSQL Flexible Server 16Elevation of PrivilegeImportantRelease NotesCVE-2024-43613
Microsoft Office LTSC for Mac 2024Remote Code ExecutionImportantRelease NotesCVE-2024-49029
Microsoft Excel 2016 (64-bit edition)Remote Code ExecutionImportant5002653CVE-2024-49028
Microsoft Excel 2016 (32-bit edition)Remote Code ExecutionImportant5002653CVE-2024-49028
Microsoft SQL Server 2017 for x64-based Systems (CU 31)Remote Code ExecutionImportant5046858CVE-2024-49012
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature PackRemote Code ExecutionImportant5046856CVE-2024-49012
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)Remote Code ExecutionImportant5046855CVE-2024-49012
Microsoft SQL Server 2017 for x64-based Systems (GDR)Remote Code ExecutionImportant5046857CVE-2024-48993
Windows Server 2012 R2 (Server Core installation)Information DisclosureImportant5046682CVE-2024-38203
Windows Server 2012 R2Information DisclosureImportant5046682CVE-2024-38203
Windows Server 2012 (Server Core installation)Information DisclosureImportant5046697CVE-2024-38203
Windows Server 2012Information DisclosureImportant5046697CVE-2024-38203
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Information DisclosureImportant5046687CVE-2024-38203
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Information DisclosureImportant5046705CVE-2024-38203
Windows Server 2016 (Server Core installation)Remote Code ExecutionCritical5046612CVE-2024-43639
Windows Server 2016Remote Code ExecutionCritical5046612CVE-2024-43639
Windows Server 2022, 23H2 Edition (Server Core installation)Remote Code ExecutionCritical5046618CVE-2024-43639
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportant5046615CVE-2024-43629
Windows 10 Version 1809 for 32-bit SystemsElevation of PrivilegeImportant5046615CVE-2024-43629
Windows Server 2025 (Server Core installation)Elevation of PrivilegeImportant5046617CVE-2024-43629
Windows Server 2025 (Server Core installation)Elevation of PrivilegeImportant5046696CVE-2024-43629
Windows Server 2025Elevation of PrivilegeImportant5046617CVE-2024-43629
Windows Server 2025Elevation of PrivilegeImportant5046696CVE-2024-43629
Windows Server 2008 R2 for x64-based Systems Service Pack 1Remote Code ExecutionImportant5046687CVE-2024-43620
Windows Server 2008 R2 for x64-based Systems Service Pack 1Remote Code ExecutionImportant5046705CVE-2024-43620
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5046661CVE-2024-43620
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5046639CVE-2024-43620
Windows Server 2008 for x64-based Systems Service Pack 2Remote Code ExecutionImportant5046661CVE-2024-43620
Windows Server 2008 for x64-based Systems Service Pack 2Remote Code ExecutionImportant5046639CVE-2024-43620
Microsoft SQL Server 2019 for x64-based Systems (GDR)Remote Code ExecutionImportant5046859CVE-2024-48996
Microsoft SQL Server 2019 for x64-based Systems (CU 29)Remote Code ExecutionImportant5046860CVE-2024-48995
Windows 10 Version 1607 for x64-based SystemsElevation of PrivilegeImportant5046612CVE-2024-43644
Windows 10 Version 1607 for 32-bit SystemsElevation of PrivilegeImportant5046612CVE-2024-43644
Windows 10 for x64-based SystemsElevation of PrivilegeImportant5046665CVE-2024-43644
Windows 10 for 32-bit SystemsElevation of PrivilegeImportant5046665CVE-2024-43644
Windows 10 Version 21H2 for ARM64-based SystemsElevation of PrivilegeImportant5046613CVE-2024-43630
Windows 10 Version 21H2 for 32-bit SystemsElevation of PrivilegeImportant5046613CVE-2024-43630
Windows Server 2022 (Server Core installation)Elevation of PrivilegeImportant5046616CVE-2024-43630
Windows Server 2022Elevation of PrivilegeImportant5046616CVE-2024-43630
Windows 11 Version 23H2 for ARM64-based SystemsElevation of PrivilegeImportant5046633CVE-2024-43626
Windows 10 Version 22H2 for 32-bit SystemsElevation of PrivilegeImportant5046613CVE-2024-43626
Windows 10 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5046613CVE-2024-43626
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5046613CVE-2024-43626
Microsoft SharePoint Server Subscription EditionDefense in DepthNone5002651ADV240001
Microsoft SharePoint Server 2019Defense in DepthNone5002650ADV240001
Microsoft SharePoint Enterprise Server 2016Defense in DepthNone5002654ADV240001
Microsoft PC ManagerElevation of PrivilegeImportantRelease NotesCVE-2024-49051
Python extension for Visual Studio CodeRemote Code ExecutionImportantRelease NotesCVE-2024-49050
Microsoft TorchGeoRemote Code ExecutionImportantRelease NotesCVE-2024-49048
Windows 11 Version 24H2 for x64-based SystemsElevation of PrivilegeImportant5046617CVE-2024-49039
Windows 11 Version 24H2 for x64-based SystemsElevation of PrivilegeImportant5046696CVE-2024-49039
Windows 11 Version 24H2 for ARM64-based SystemsElevation of PrivilegeImportant5046617CVE-2024-49039
Windows 11 Version 24H2 for ARM64-based SystemsElevation of PrivilegeImportant5046696CVE-2024-49039
Windows 11 Version 23H2 for x64-based SystemsElevation of PrivilegeImportant5046633CVE-2024-49039
Windows 11 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5046633CVE-2024-49039
Windows 11 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5046633CVE-2024-49039
Windows 10 Version 21H2 for x64-based SystemsElevation of PrivilegeImportant5046613CVE-2024-49039
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportant5046615CVE-2024-49039
Windows Server 2019Elevation of PrivilegeImportant5046615CVE-2024-49039
Microsoft Word 2016 (64-bit edition)Security Feature BypassImportant5002619CVE-2024-49033
Microsoft Word 2016 (32-bit edition)Security Feature BypassImportant5002619CVE-2024-49033
Microsoft Office LTSC 2024 for 64-bit editionsSecurity Feature BypassImportantClick to RunCVE-2024-49033
Microsoft Office LTSC 2024 for 32-bit editionsSecurity Feature BypassImportantClick to RunCVE-2024-49033
Microsoft Office LTSC 2021 for 32-bit editionsSecurity Feature BypassImportantClick to RunCVE-2024-49033
Microsoft Office LTSC 2021 for 64-bit editionsSecurity Feature BypassImportantClick to RunCVE-2024-49033
Microsoft Office LTSC for Mac 2021Security Feature BypassImportantRelease NotesCVE-2024-49033
Microsoft 365 Apps for Enterprise for 64-bit SystemsSecurity Feature BypassImportantClick to RunCVE-2024-49033
Microsoft 365 Apps for Enterprise for 32-bit SystemsSecurity Feature BypassImportantClick to RunCVE-2024-49033
Microsoft Office 2019 for 64-bit editionsSecurity Feature BypassImportantClick to RunCVE-2024-49033
Microsoft Office 2019 for 32-bit editionsSecurity Feature BypassImportantClick to RunCVE-2024-49033
Microsoft Office 2016 (64-bit edition)Remote Code ExecutionImportant5002642CVE-2024-49032
Microsoft Office 2016 (32-bit edition)Remote Code ExecutionImportant5002642CVE-2024-49032
Microsoft Excel 2016 Click-to-Run (C2R) for 64-bit editionsRemote Code ExecutionImportant5002653CVE-2024-49026
Microsoft Excel 2016 Click-to-Run (C2R) for 32-bit editionsRemote Code ExecutionImportant5002653CVE-2024-49026
Microsoft Office Online ServerRemote Code ExecutionImportant5002648CVE-2024-49026
Microsoft SQL Server 2022 for x64-based Systems (CU 15)Remote Code ExecutionImportant5046862CVE-2024-49021
Microsoft SQL Server 2022 for x64-based Systems (GDR)Remote Code ExecutionImportant5046861CVE-2024-49021
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5046661CVE-2024-49019
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5046639CVE-2024-49019
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5046661CVE-2024-49019
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5046639CVE-2024-49019
.NET 9.0 installed on LinuxRemote Code ExecutionCriticalRelease NotesCVE-2024-43498
.NET 9.0 installed on WindowsRemote Code ExecutionCriticalRelease NotesCVE-2024-43498
.NET 9.0 installed on Mac OSRemote Code ExecutionCriticalRelease NotesCVE-2024-43498
Microsoft Visual Studio 2022 version 17.11Remote Code ExecutionCriticalRelease NotesCVE-2024-43498
Microsoft Visual Studio 2022 version 17.10Remote Code ExecutionCriticalRelease NotesCVE-2024-43498
Microsoft Visual Studio 2022 version 17.6Remote Code ExecutionCriticalRelease NotesCVE-2024-43498
Microsoft Visual Studio 2022 version 17.8Remote Code ExecutionCriticalRelease NotesCVE-2024-43498
LightGBMRemote Code ExecutionImportantReleaase NotesCVE-2024-43598
airlift.microsoft.comElevation of PrivilegeCriticalCVE-2024-49056
Visual Studio Code Remote – SSH ExtensionElevation of PrivilegeModerateRelease NotesCVE-2024-49049
Microsoft Exchange Server 2016 Cumulative Update 23SpoofingImportant5044062CVE-2024-49040
Microsoft Exchange Server 2019 Cumulative Update 14SpoofingImportant5044062CVE-2024-49040
Microsoft Exchange Server 2019 Cumulative Update 13SpoofingImportant5044062CVE-2024-49040
Microsoft Defender for Endpoint for iOSRemote Code ExecutionImportantRelease NotesCVE-2024-5535
Microsoft Defender for Endpoint for AndroidRemote Code ExecutionImportantRelease NotesCVE-2024-5535
Azure Linux 3.0 ARMopensslCVE-2024-5535
CBL Mariner 2.0 x64cloud-hypervisor-cvmCVE-2024-5535
CBL Mariner 2.0 x64opensslCVE-2024-5535
CBL Mariner 2.0 ARMcloud-hypervisor-cvmCVE-2024-5535
CBL Mariner 2.0 ARMopensslCVE-2024-5535
Azure Linux 3.0 x64opensslCVE-2024-5535
Windows Server 2012 R2 (Server Core installation)SpoofingImportant5046630CVE-2024-43451
Windows Server 2012 R2SpoofingImportant5046630CVE-2024-43451
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)SpoofingImportant5046630CVE-2024-43451
Windows Server 2008 R2 for x64-based Systems Service Pack 1SpoofingImportant5046630CVE-2024-43451
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)SpoofingImportant5046630CVE-2024-43451
Windows Server 2008 for x64-based Systems Service Pack 2SpoofingImportant5046630CVE-2024-43451
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)SpoofingImportant5046630CVE-2024-43451
Windows Server 2008 for 32-bit Systems Service Pack 2SpoofingImportant5046630CVE-2024-43451
Azure CycleCloud 8.3.0Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.5.0Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.4.0Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.4.2Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.1.1Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.4.1Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.2.2Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.2.1Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.2.0Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.1.0Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.0.2Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.6.1Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.6.2Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.6.0Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.0.1Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.0.0Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.6.4Remote Code ExecutionImportantRelease NotesCVE-2024-43602
Azure CycleCloud 8.6.3Remote Code ExecutionImportantRelease NotesCVE-2024-43602

Quality and experience updates

For Windows 11 version 24H2, the KB5046617 update brings several enhancements, including Copilot key settings, notifications suggestions, and narrator improvements. Microsoft has also introduced a new Windows Sandbox app that adds support for Runtime clipboard redirection, audio and video input control as well as the ability to share folders with the host at runtime.

Additionally, Microsoft has released the KB5046633 update for users running Windows 11 versions 23H2 and 22H2. This patch also includes the new Copilot key settings and enhancements for Narrator and notifications. Microsoft has addressed an issue that was previously causing excessive battery consumption in Modern Standby mode.

For Windows 10 versions 22H2 and 21H2, the KB5046613 update introduces a new account manager on the Start menu. Microsoft has also fixed a bug that was previously preventing users from opening apps like Quick Assist, Microsoft Teams, and Windows Narrator without administrative privileges.

Windows Update testing and best practices

Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.

A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.

There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.

SHARE ARTICLE