Microsoft’s September 2024 Patch Tuesday Update Fixes 79 Vulnerabilities

Last Update: Nov 19, 2024 | Published: Sep 11, 2024

Windows-11-notebook-tablet

SHARE ARTICLE

Key Takeaways:

  • Microsoft addressed 79 vulnerabilities in September 2024 Patch Tuesday, with 7 critical flaws in components like Windows, Office, and SharePoint.
  • Notable vulnerabilities include CVE-2024-38014 (Windows Installer elevation-of-privilege), CVE-2024-38226 (Microsoft Publisher security bypass), and CVE-2024-43491, a zero-day Windows Update remote-code execution flaw.
  • Quality updates include fixes for a bug that was causing apps to stop responding due to memory leak issues in Bluetooth devices.

Microsoft released yesterday the September 2024 Patch Tuesday updates for all supported versions of Windows 10 and Windows 11. This time around, Microsoft has addressed 79 new vulnerabilities in Windows, Office, Windows Hyper-V, Mark of the Web (MOTW), and other components.

September 2024 Patch Tuesday updates fix 7 critical vulnerabilities

According to the Zero Day Initiative, Microsoft has released a total of 71 security patches, with fixes for 7 critical vulnerabilities.

  • CVE-2024-38014: This is a Windows Installer elevation-of-privilege vulnerability with a CVSS score of 7.8 that affects Windows desktop and server systems. A successful exploit could give attackers unwanted privileges on the device.
  • CVE-2024-38226: This is a security bypass vulnerability in Microsoft Publisher with a CVSS rating of 7.3. It allows an attacker to bypass Office macros that protect users against untrusted and malicious files.
  • CVE-2024-38217: This is a Windows Mark of the Web (MOTW) security feature bypass flaw that blocks harmful files and content downloaded from the Internet. Threat actors could exploit this flaw by convincing the victim to download and open a malicious file to evade MOTW protections in Windows.
  • CVE-2024-43491: The zero-day Windows Update remote-code execution vulnerability affects PCs running Windows 10 version 1507. Microsoft dropped support for Windows 10 version 1507 back in May 2017. However, Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB will remain supported until October 2025. Microsoft has addressed this flaw in the September 2024 Servicing stack update and the Windows security update.
  • CVE-2024-38018 and CVE-2024-43464: The two critical SharePoint Server flaws could enable hackers with Site Member and Site owner permissions to execute code remotely.

Here’s a full list of CVEs Microsoft released this month:

ProductImpactMax SeverityArticleDownloadDetails
Azure CycleCloud 8.4.2Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.4.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.4.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.3.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.2.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.2.2Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.1.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Windows 11 Version 24H2 for ARM64-based SystemsRemote Code ExecutionCritical5043080Security UpdateCVE-2024-38119
Windows Server 2022, 23H2 Edition (Server Core installation)Remote Code ExecutionCritical5043055Security UpdateCVE-2024-38119
Windows 11 Version 23H2 for x64-based SystemsRemote Code ExecutionCritical5043076Security UpdateCVE-2024-38119
Windows 11 Version 23H2 for ARM64-based SystemsRemote Code ExecutionCritical5043076Security UpdateCVE-2024-38119
Windows 10 Version 22H2 for 32-bit SystemsRemote Code ExecutionCritical5043064Security UpdateCVE-2024-38119
Windows 10 Version 22H2 for ARM64-based SystemsRemote Code ExecutionCritical5043064Security UpdateCVE-2024-38119
Windows 11 Version 22H2 for x64-based SystemsRemote Code ExecutionImportant5043076Security UpdateCVE-2024-38259
Windows 11 Version 22H2 for ARM64-based SystemsRemote Code ExecutionImportant5043076Security UpdateCVE-2024-38259
Windows 11 version 21H2 for ARM64-based SystemsRemote Code ExecutionImportant5043067Security UpdateCVE-2024-38259
Windows 11 version 21H2 for x64-based SystemsRemote Code ExecutionImportant5043067Security UpdateCVE-2024-38259
Windows Server 2022 (Server Core installation)Remote Code ExecutionImportant5042881Security UpdateCVE-2024-38259
Windows Server 2022 (Server Core installation)Remote Code ExecutionImportant5042880SecurityHotpatchUpdateCVE-2024-38259
Windows Server 2022Remote Code ExecutionImportant5042881Security UpdateCVE-2024-38259
Windows Server 2022Remote Code ExecutionImportant5042880SecurityHotpatchUpdateCVE-2024-38259
Windows Server 2012 R2 (Server Core installation)Information DisclosureImportant5043138Monthly RollupCVE-2024-38258
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5043064Security UpdateCVE-2024-38246
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportant5043050Security UpdateCVE-2024-38243
Windows Server 2019Elevation of PrivilegeImportant5043050Security UpdateCVE-2024-38243
Windows 10 Version 1809 for ARM64-based SystemsElevation of PrivilegeImportant5043050Security UpdateCVE-2024-38243
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportant5043050Security UpdateCVE-2024-38237
Windows 10 Version 1809 for 32-bit SystemsElevation of PrivilegeImportant5043050Security UpdateCVE-2024-38237
Windows Server 2016 (Server Core installation)Denial of ServiceImportant5043051Security UpdateCVE-2024-38235
Windows Server 2016Denial of ServiceImportant5043051Security UpdateCVE-2024-38235
Windows 10 Version 1607 for x64-based SystemsDenial of ServiceImportant5043051Security UpdateCVE-2024-38235
Windows Server 2012 R2Security Feature BypassImportant5043138Monthly RollupCVE-2024-38217
Windows Server 2012 (Server Core installation)Security Feature BypassImportant5043125Monthly RollupCVE-2024-38217
Windows Server 2012Security Feature BypassImportant5043125Monthly RollupCVE-2024-38217
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Security Feature BypassImportant5043129Monthly RollupCVE-2024-38217
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Security Feature BypassImportant5043092Security OnlyCVE-2024-38217
Windows Server 2008 R2 for x64-based Systems Service Pack 1Security Feature BypassImportant5043129Monthly RollupCVE-2024-38217
Windows Server 2008 R2 for x64-based Systems Service Pack 1Security Feature BypassImportant5043092Security OnlyCVE-2024-38217
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Security Feature BypassImportant5043135Monthly RollupCVE-2024-38217
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Security Feature BypassImportant5043087Security OnlyCVE-2024-38217
Windows Server 2008 for x64-based Systems Service Pack 2Security Feature BypassImportant5043135Monthly RollupCVE-2024-38217
Windows Server 2008 for x64-based Systems Service Pack 2Security Feature BypassImportant5043087Security OnlyCVE-2024-38217
Microsoft SQL Server 2019 for x64-based Systems (CU 28)Elevation of PrivilegeImportant5042749Security UpdateCVE-2024-37341
Microsoft SQL Server 2022 for x64-based Systems (CU 14)Elevation of PrivilegeImportant5042578Security UpdateCVE-2024-37341
Windows 10 Version 21H2 for x64-based SystemsInformation DisclosureImportant5043064Security UpdateCVE-2024-38254
Windows 10 Version 21H2 for ARM64-based SystemsInformation DisclosureImportant5043064Security UpdateCVE-2024-38254
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5043135Monthly RollupCVE-2024-38249
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5043087Security OnlyCVE-2024-38249
Windows 10 Version 1607 for 32-bit SystemsElevation of PrivilegeImportant5043051Security UpdateCVE-2024-38249
Windows 10 for x64-based SystemsElevation of PrivilegeImportant5043083Security UpdateCVE-2024-38249
Microsoft SQL Server 2022 for x64-based Systems (GDR)Elevation of PrivilegeImportant5042211Security UpdateCVE-2024-37980
Microsoft SQL Server 2017 for x64-based Systems (CU 31)Elevation of PrivilegeImportant5042215Security UpdateCVE-2024-37980
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature PackElevation of PrivilegeImportant5042209Security UpdateCVE-2024-37980
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR)Elevation of PrivilegeImportant5042207Security UpdateCVE-2024-37980
Microsoft SQL Server 2019 for x64-based Systems (GDR)Elevation of PrivilegeImportant5042214Security UpdateCVE-2024-37980
Microsoft SQL Server 2017 for x64-based Systems (GDR)Elevation of PrivilegeImportant5042217Security UpdateCVE-2024-37980
Azure Web AppsElevation of PrivilegeCriticalCVE-2024-38194
Windows Server 2022, 23H2 Edition (Server Core installation)Remote Code ExecutionImportant5040438Security UpdateCVE-2024-43495
Windows 11 Version 23H2 for x64-based SystemsRemote Code ExecutionImportant5040442Security UpdateCVE-2024-43495
Windows 11 Version 23H2 for ARM64-based SystemsRemote Code ExecutionImportant5040442Security UpdateCVE-2024-43495
Windows 11 Version 22H2 for x64-based SystemsRemote Code ExecutionImportant5040442Security UpdateCVE-2024-43495
Windows 11 Version 22H2 for ARM64-based SystemsRemote Code ExecutionImportant5040442Security UpdateCVE-2024-43495
Windows 10 for 32-bit SystemsRemote Code ExecutionCritical5043083Security UpdateCVE-2024-43491
Windows 10 Version 21H2 for 32-bit SystemsSecurity Feature BypassModerate5043064Security UpdateCVE-2024-43487
Windows Server 2012 R2Security Feature BypassImportant5043049IE CumulativeCVE-2024-30073
Windows Server 2012Security Feature BypassImportant5043049IE CumulativeCVE-2024-30073
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Security Feature BypassImportant5043049IE CumulativeCVE-2024-30073
Windows Server 2008 R2 for x64-based Systems Service Pack 1Security Feature BypassImportant5043049IE CumulativeCVE-2024-30073
Windows Server 2008 for x64-based Systems Service Pack 2Security Feature BypassImportant5043049IE CumulativeCVE-2024-30073
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Security Feature BypassImportant5043135Monthly RollupCVE-2024-30073
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Security Feature BypassImportant5043087Security OnlyCVE-2024-30073
Windows Server 2008 for 32-bit Systems Service Pack 2Security Feature BypassImportant5043049IE CumulativeCVE-2024-30073
Windows 11 Version 24H2 for x64-based SystemsSecurity Feature BypassImportant5043080Security UpdateCVE-2024-30073
Power Automate for DesktopRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43479
Microsoft Dynamics 365 (on-premises) version 9.1SpoofingImportant5043254Security UpdateCVE-2024-43476
Azure Network Watcher VM Extension for WindowsElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-43470
Azure CycleCloud 8.6.3Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.6.2Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.6.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.5.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.1.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.0.2Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.0.1Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.6.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.0.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Azure CycleCloud 8.2.0Remote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-43469
Microsoft SharePoint Server Subscription EditionDenial of ServiceImportant5002640Security UpdateCVE-2024-43466
Microsoft SharePoint Server 2019Denial of ServiceImportant5002639Security UpdateCVE-2024-43466
Microsoft SharePoint Enterprise Server 2016Denial of ServiceImportant5002624Security UpdateCVE-2024-43466
Microsoft Publisher 2016 (64-bit edition)Security Feature BypassImportant5002566Security UpdateCVE-2024-38226
Microsoft Publisher 2016 (32-bit edition)Security Feature BypassImportant5002566Security UpdateCVE-2024-38226
Microsoft Office LTSC 2021 for 32-bit editionsSecurity Feature BypassImportantClick to RunSecurity UpdateCVE-2024-38226
Microsoft Office LTSC 2021 for 64-bit editionsSecurity Feature BypassImportantClick to RunSecurity UpdateCVE-2024-38226
Microsoft Office 2019 for 64-bit editionsSecurity Feature BypassImportantClick to RunSecurity UpdateCVE-2024-38226
Microsoft Office 2019 for 32-bit editionsSecurity Feature BypassImportantClick to RunSecurity UpdateCVE-2024-38226
Microsoft Dynamics 365 Business Central 2023 Release Wave 2Elevation of PrivilegeImportant5042530Security UpdateCVE-2024-38225
Microsoft Dynamics 365 Business Central 2024 Release Wave 1Elevation of PrivilegeImportant5042529Security UpdateCVE-2024-38225
Microsoft Dynamics 365 Business Central 2023 Release Wave 1Elevation of PrivilegeImportant5042528Security UpdateCVE-2024-38225
Microsoft Excel 2016 (64-bit edition)Elevation of PrivilegeImportant5002605Security UpdateCVE-2024-43465
Microsoft Excel 2016 (32-bit edition)Elevation of PrivilegeImportant5002605Security UpdateCVE-2024-43465
Microsoft Office LTSC for Mac 2021Elevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-43465
Microsoft 365 Apps for Enterprise for 64-bit SystemsElevation of PrivilegeImportantClick to RunSecurity UpdateCVE-2024-43465
Microsoft 365 Apps for Enterprise for 32-bit SystemsElevation of PrivilegeImportantClick to RunSecurity UpdateCVE-2024-43465
Microsoft Office Online ServerElevation of PrivilegeImportant5002601Security UpdateCVE-2024-43465
Microsoft AutoUpdate for MacElevation of PrivilegeImportantMAUSecurity UpdateCVE-2024-43492
Outlook for iOSInformation DisclosureImportantRelease NotesSecurity UpdateCVE-2024-43482
Microsoft Visio 2016 (64-bit edition)Remote Code ExecutionImportant5002634Security UpdateCVE-2024-43463
Microsoft Visio 2016 (32-bit edition)Remote Code ExecutionImportant5002634Security UpdateCVE-2024-43463
Microsoft Office for UniversalElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-38250
Microsoft Office for AndroidElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-38250
Azure Stack HubElevation of PrivilegeCriticalRelease NotesSecurity UpdateCVE-2024-38220
Microsoft Entra IDElevation of PrivilegeCriticalCVE-2024-43477
Microsoft Edge (Chromium-based)Release NotesSecurity UpdateCVE-2024-7974
Microsoft Edge for AndroidSpoofingModerateRelease NotesSecurity UpdateCVE-2024-38208
Azure Managed Instance for Apache CassandraElevation of PrivilegeCriticalXXXSecurity UpdateCVE-2024-38175
Windows Server 2022Elevation of PrivilegeImportant5040437Security UpdateCVE-2024-38186
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportant5040430Security UpdateCVE-2024-38186
Windows Server 2019Elevation of PrivilegeImportant5040430Security UpdateCVE-2024-38186
Windows 10 Version 1809 for ARM64-based SystemsElevation of PrivilegeImportant5040430Security UpdateCVE-2024-38186
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportant5040430Security UpdateCVE-2024-38186
C SDK for Azure IoTRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38158
Azure IoT Hub Device Client SDKRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38157
Windows 11 Version 24H2 for x64-based SystemsInformation DisclosureImportant5041571Security UpdateCVE-2024-38155
Windows 11 Version 24H2 for ARM64-based SystemsInformation DisclosureImportant5041571Security UpdateCVE-2024-38155
Windows 11 Version 23H2 for x64-based SystemsInformation DisclosureImportant5041585Security UpdateCVE-2024-38155
Windows 11 Version 23H2 for ARM64-based SystemsInformation DisclosureImportant5041585Security UpdateCVE-2024-38155
Windows 10 Version 22H2 for 32-bit SystemsInformation DisclosureImportant5041580Security UpdateCVE-2024-38155
Windows 10 Version 21H2 for x64-based SystemsRemote Code ExecutionImportant5041580Security UpdateCVE-2024-38152
Windows 10 Version 21H2 for ARM64-based SystemsRemote Code ExecutionImportant5041580Security UpdateCVE-2024-38152
Windows 10 Version 21H2 for 32-bit SystemsRemote Code ExecutionImportant5041580Security UpdateCVE-2024-38152
Windows 11 version 21H2 for ARM64-based SystemsRemote Code ExecutionImportant5041592Security UpdateCVE-2024-38152
Windows 11 version 21H2 for x64-based SystemsRemote Code ExecutionImportant5041592Security UpdateCVE-2024-38152
Windows Server 2022 (Server Core installation)Remote Code ExecutionImportant5041160Security UpdateCVE-2024-38152
Windows Server 2016Denial of ServiceImportant5041773Security UpdateCVE-2024-38146
Windows 10 Version 1607 for x64-based SystemsDenial of ServiceImportant5041773Security UpdateCVE-2024-38146
Windows 10 Version 1607 for 32-bit SystemsDenial of ServiceImportant5041773Security UpdateCVE-2024-38146
Windows 10 for x64-based SystemsDenial of ServiceImportant5041782Security UpdateCVE-2024-38146
Windows 10 for 32-bit SystemsDenial of ServiceImportant5041782Security UpdateCVE-2024-38146
Windows Server 2022, 23H2 Edition (Server Core installation)Denial of ServiceImportant5041573Security UpdateCVE-2024-38146
Windows Server 2022Elevation of PrivilegeImportant5041160Security UpdateCVE-2024-38134
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportant5041578Security UpdateCVE-2024-38134
Windows Server 2012 (Server Core installation)Elevation of PrivilegeImportant5041851Monthly RollupCVE-2024-38127
Windows Server 2012Elevation of PrivilegeImportant5041851Monthly RollupCVE-2024-38127
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5041838Monthly RollupCVE-2024-38127
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5041823Security OnlyCVE-2024-38127
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5041838Monthly RollupCVE-2024-38127
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5041823Security OnlyCVE-2024-38127
Windows Server 2016 (Server Core installation)Elevation of PrivilegeImportant5041773Security UpdateCVE-2024-38127
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Information DisclosureImportant5041850Monthly RollupCVE-2024-38122
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Information DisclosureImportant5041847Security OnlyCVE-2024-38122
Windows Server 2008 for 32-bit Systems Service Pack 2Information DisclosureImportant5041850Monthly RollupCVE-2024-38122
Windows Server 2008 for 32-bit Systems Service Pack 2Information DisclosureImportant5041847Security OnlyCVE-2024-38122
Windows 10 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5041580Security UpdateCVE-2024-38117
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5041580Security UpdateCVE-2024-38117
Windows 11 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5041585Security UpdateCVE-2024-38117
Windows 11 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5041585Security UpdateCVE-2024-38117
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5041850Monthly RollupCVE-2024-38114
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Remote Code ExecutionImportant5041847Security OnlyCVE-2024-38114
Windows Server 2008 for x64-based Systems Service Pack 2Remote Code ExecutionImportant5041850Monthly RollupCVE-2024-38114
Windows Server 2008 for x64-based Systems Service Pack 2Remote Code ExecutionImportant5041847Security OnlyCVE-2024-38114
Windows Server 2012 R2 (Server Core installation)SpoofingImportant5041828Monthly RollupCVE-2024-37968
Windows Server 2012 R2SpoofingImportant5041828Monthly RollupCVE-2024-37968
Windows Server 2019SpoofingImportant5041578Security UpdateCVE-2024-37968
Azure Health BotElevation of PrivilegeCriticalCVE-2024-38109
Windows 10 Version 1809 for ARM64-based SystemsElevation of PrivilegeImportant5041578Security UpdateCVE-2024-38223
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportant5041578Security UpdateCVE-2024-38223
Windows 10 Version 1809 for 32-bit SystemsElevation of PrivilegeImportant5041578Security UpdateCVE-2024-38223
Microsoft Dynamics 365 (on-premises) version 9.1SpoofingImportant5041557Security UpdateCVE-2024-38211
CBL Mariner 2.0 x64grub2CBL-MarinerCVE-2022-3775
CBL Mariner 2.0 ARMgrub2CBL-MarinerCVE-2022-3775
CBL Mariner 1.0 x64grub2CBL-MarinerCVE-2022-3775
CBL Mariner 1.0 ARMgrub2CBL-MarinerCVE-2022-3775
Azure Linux 3.0 x64grub2CBL-MarinerCVE-2022-3775
Azure Linux 3.0 ARMgrub2CBL-MarinerCVE-2022-3775
Windows 10 Version 22H2 for 32-bit SystemsElevation of PrivilegeImportant5042320Security UpdateCVE-2024-38163
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5042320Security UpdateCVE-2024-38163
Windows 10 Version 21H2 for x64-based SystemsElevation of PrivilegeImportant5042320Security UpdateCVE-2024-38163
Windows 10 Version 21H2 for 32-bit SystemsElevation of PrivilegeImportant5042320Security UpdateCVE-2024-38163
Windows 11 version 21H2 for x64-based SystemsElevation of PrivilegeImportant5042321Security UpdateCVE-2024-38163
Windows Server 2022Elevation of PrivilegeImportant5042322Security UpdateCVE-2024-38163
Microsoft Project 2016 (64-bit edition)Remote Code ExecutionImportant5002561Security UpdateCVE-2024-38189
Microsoft Project 2016 (32-bit edition)Remote Code ExecutionImportant5002561Security UpdateCVE-2024-38189
Windows Server 2016 (Server Core installation)Elevation of PrivilegeImportant5040434Security UpdateCVE-2024-38187
Windows Server 2016Elevation of PrivilegeImportant5040434Security UpdateCVE-2024-38187
Windows 10 Version 1607 for x64-based SystemsElevation of PrivilegeImportant5040434Security UpdateCVE-2024-38187
Windows 10 Version 1607 for 32-bit SystemsElevation of PrivilegeImportant5040434Security UpdateCVE-2024-38187
Windows 10 Version 22H2 for 32-bit SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 21H2 for x64-based SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 21H2 for ARM64-based SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 10 Version 21H2 for 32-bit SystemsElevation of PrivilegeImportant5040427Security UpdateCVE-2024-38187
Windows 11 version 21H2 for ARM64-based SystemsElevation of PrivilegeImportant5040431Security UpdateCVE-2024-38187
Windows 11 version 21H2 for x64-based SystemsElevation of PrivilegeImportant5040431Security UpdateCVE-2024-38187
Windows Server 2022 (Server Core installation)Elevation of PrivilegeImportant5040437Security UpdateCVE-2024-38187
Windows 10 Version 1809 for 32-bit SystemsElevation of PrivilegeImportant5040430Security UpdateCVE-2024-38187
App InstallerSpoofingImportantRelease NotesSecurity UpdateCVE-2024-38177
Microsoft Outlook 2016 (64-bit edition)Remote Code ExecutionImportant5002626Security UpdateCVE-2024-38173
Microsoft Outlook 2016 (32-bit edition)Remote Code ExecutionImportant5002626Security UpdateCVE-2024-38173
Microsoft PowerPoint 2016 (64-bit edition)Remote Code ExecutionImportant5002586Security UpdateCVE-2024-38171
Microsoft PowerPoint 2016 (32-bit edition)Remote Code ExecutionImportant5002586Security UpdateCVE-2024-38171
Azure Connected Machine AgentElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-38162
Windows Server 2019 (Server Core installation)Remote Code ExecutionImportant5043126ServicingStackUpdateCVE-2024-38138
Windows Server 2019Remote Code ExecutionImportant5043126ServicingStackUpdateCVE-2024-38138
Remote Desktop client for Windows DesktopRemote Code ExecutionImportantRelease NotesSecurity UpdateCVE-2024-38131
Microsoft OfficePLUSElevation of PrivilegeImportantRelease NotesSecurity UpdateCVE-2024-38084
Windows Server 2012 R2 (Server Core installation)Security Feature BypassModerate5039294Monthly RollupCVE-2024-38213
Windows Server 2012 R2Security Feature BypassModerate5039294Monthly RollupCVE-2024-38213
Windows Server 2012 (Server Core installation)Security Feature BypassModerate5039260Monthly RollupCVE-2024-38213
Windows Server 2012Security Feature BypassModerate5039260Monthly RollupCVE-2024-38213
Windows Server 2016 (Server Core installation)Security Feature BypassModerate5039214Security UpdateCVE-2024-38213
Windows Server 2016Security Feature BypassModerate5039214Security UpdateCVE-2024-38213
Windows 10 Version 1607 for x64-based SystemsSecurity Feature BypassModerate5039214Security UpdateCVE-2024-38213
Windows 10 Version 1607 for 32-bit SystemsSecurity Feature BypassModerate5039214Security UpdateCVE-2024-38213
Windows 10 for x64-based SystemsSecurity Feature BypassModerate5039225Security UpdateCVE-2024-38213
Windows 10 for 32-bit SystemsSecurity Feature BypassModerate5039225Security UpdateCVE-2024-38213
Windows Server 2022, 23H2 Edition (Server Core installation)Security Feature BypassModerate5039236Security UpdateCVE-2024-38213
Windows 11 Version 23H2 for x64-based SystemsSecurity Feature BypassModerate5039212Security UpdateCVE-2024-38213
Windows 11 Version 23H2 for ARM64-based SystemsSecurity Feature BypassModerate5039212Security UpdateCVE-2024-38213
Windows 10 Version 22H2 for 32-bit SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 10 Version 22H2 for ARM64-based SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 10 Version 22H2 for x64-based SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 11 Version 22H2 for x64-based SystemsSecurity Feature BypassModerate5039212Security UpdateCVE-2024-38213
Windows 11 Version 22H2 for ARM64-based SystemsSecurity Feature BypassModerate5039212Security UpdateCVE-2024-38213
Windows 10 Version 21H2 for x64-based SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 10 Version 21H2 for ARM64-based SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 10 Version 21H2 for 32-bit SystemsSecurity Feature BypassModerate5039211Security UpdateCVE-2024-38213
Windows 11 version 21H2 for ARM64-based SystemsSecurity Feature BypassModerate5039213Security UpdateCVE-2024-38213
Windows 11 version 21H2 for x64-based SystemsSecurity Feature BypassModerate5039213Security UpdateCVE-2024-38213
Windows Server 2022 (Server Core installation)Security Feature BypassModerate5039227Security UpdateCVE-2024-38213
Windows Server 2022 (Server Core installation)Security Feature BypassModerate5039330Security Hotpatch UpdateCVE-2024-38213
Windows Server 2022Security Feature BypassModerate5039227Security UpdateCVE-2024-38213
Windows Server 2022Security Feature BypassModerate5039330Security Hotpatch UpdateCVE-2024-38213
Windows Server 2019 (Server Core installation)Security Feature BypassModerate5039217Security UpdateCVE-2024-38213
Windows Server 2019Security Feature BypassModerate5039217Security UpdateCVE-2024-38213
Windows 10 Version 1809 for ARM64-based SystemsSecurity Feature BypassModerate5039217Security UpdateCVE-2024-38213
Windows 10 Version 1809 for x64-based SystemsSecurity Feature BypassModerate5039217Security UpdateCVE-2024-38213
Windows 10 Version 1809 for 32-bit SystemsSecurity Feature BypassModerate5039217Security UpdateCVE-2024-38213
Microsoft Teams for iOSSpoofingImportantRelease NotesSecurity UpdateCVE-2024-38197
Windows Server 2012 R2 (Server Core installation)Elevation of PrivilegeImportant5040456Monthly RollupCVE-2024-38191
Windows Server 2012 R2Elevation of PrivilegeImportant5040456Monthly RollupCVE-2024-38191
Windows Server 2012 (Server Core installation)Elevation of PrivilegeImportant5040485Monthly RollupCVE-2024-38191
Windows Server 2012Elevation of PrivilegeImportant5040485Monthly RollupCVE-2024-38191
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5040497Monthly RollupCVE-2024-38191
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)Elevation of PrivilegeImportant5040498Security OnlyCVE-2024-38191
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5040497Monthly RollupCVE-2024-38191
Windows Server 2008 R2 for x64-based Systems Service Pack 1Elevation of PrivilegeImportant5040498Security OnlyCVE-2024-38191
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5040499Monthly RollupCVE-2024-38191
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5040490Security OnlyCVE-2024-38191
Windows Server 2008 for x64-based Systems Service Pack 2Elevation of PrivilegeImportant5040499Monthly RollupCVE-2024-38191
Windows Server 2008 for x64-based Systems Service Pack 2Elevation of PrivilegeImportant5040490Security OnlyCVE-2024-38191
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5040499Monthly RollupCVE-2024-38191
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)Elevation of PrivilegeImportant5040490Security OnlyCVE-2024-38191
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5040499Monthly RollupCVE-2024-38191
Windows Server 2008 for 32-bit Systems Service Pack 2Elevation of PrivilegeImportant5040490Security OnlyCVE-2024-38191
Windows 10 for x64-based SystemsElevation of PrivilegeImportant5040448Security UpdateCVE-2024-38191
Windows 10 for 32-bit SystemsElevation of PrivilegeImportant5040448Security UpdateCVE-2024-38191
Windows Server 2012 R2 (Server Core installation)Remote Code ExecutionImportant5041770IE CumulativeCVE-2024-38178
Windows Server 2012 R2Remote Code ExecutionImportant5041770IE CumulativeCVE-2024-38178
Microsoft Visual Studio 2022 version 17.8Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2024-38168
Microsoft Visual Studio 2022 version 17.10Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2024-38168
Microsoft Visual Studio 2022 version 17.6Denial of ServiceImportantRelease NotesSecurity UpdateCVE-2024-38168
.NET 8.0Denial of ServiceImportant5042132Security UpdateCVE-2024-38168
Microsoft Office 2016 (64-bit edition)SpoofingImportant5002625Security UpdateCVE-2024-38200
Microsoft Office 2016 (64-bit edition)SpoofingImportant5002570Security UpdateCVE-2024-38200
Microsoft Office 2016 (32-bit edition)SpoofingImportant5002625Security UpdateCVE-2024-38200
Microsoft Office 2016 (32-bit edition)SpoofingImportant5002570Security UpdateCVE-2024-38200
Windows Server 2016 (Server Core installation)Elevation of PrivilegeImportantCVE-2024-38202
Windows Server 2016Elevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 1607 for x64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 1607 for 32-bit SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows Server 2022, 23H2 Edition (Server Core installation)Elevation of PrivilegeImportantCVE-2024-38202
Windows 11 Version 23H2 for x64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 11 Version 23H2 for ARM64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 22H2 for 32-bit SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 22H2 for x64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 11 Version 22H2 for x64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 11 Version 22H2 for ARM64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 21H2 for x64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 21H2 for ARM64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 21H2 for 32-bit SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 11 version 21H2 for ARM64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 11 version 21H2 for x64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows Server 2022 (Server Core installation)Elevation of PrivilegeImportantCVE-2024-38202
Windows Server 2022Elevation of PrivilegeImportantCVE-2024-38202
Windows Server 2019 (Server Core installation)Elevation of PrivilegeImportantCVE-2024-38202
Windows Server 2019Elevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 1809 for ARM64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 1809 for x64-based SystemsElevation of PrivilegeImportantCVE-2024-38202
Windows 10 Version 1809 for 32-bit SystemsElevation of PrivilegeImportantCVE-2024-38202
Microsoft Copilot StudioInformation DisclosureCriticalCVE-2024-38206
Dynamics CRM Service Portal Web ResourceSpoofingCriticalCVE-2024-38166

Quality and experience updates

Microsoft has released the KB5043080 and KB5043076 patches for Windows 11 versions 24H2 as well as versions 23H2 and 22H2, respectively. These updates allow users to use Windows Share to share content to linked Android devices. Microsoft has also started rolling out new APIs that let third-party developers create new widget feeds in the EU.

For Windows 10 users, Microsoft has released the KB5043064 patch to address a bug that was previously causing apps to stop responding due to memory leak in Bluetooth devices. The company has also fixed an issue that was cauing the Microsoft System Center Configuration Manager (SCCM) task to re-enable Unified Write Filter (UWF) fail due to a deadlock in UWF. This bug prevents users from rebooting their devices.

Windows Update testing and best practices

Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.

A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.

There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.

SHARE ARTICLE