Last Update: Nov 19, 2024 | Published: Sep 11, 2024
Key Takeaways:
Microsoft released yesterday the September 2024 Patch Tuesday updates for all supported versions of Windows 10 and Windows 11. This time around, Microsoft has addressed 79 new vulnerabilities in Windows, Office, Windows Hyper-V, Mark of the Web (MOTW), and other components.
According to the Zero Day Initiative, Microsoft has released a total of 71 security patches, with fixes for 7 critical vulnerabilities.
Here’s a full list of CVEs Microsoft released this month:
Product | Impact | Max Severity | Article | Download | Details |
Azure CycleCloud 8.4.2 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.4.1 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.4.0 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.3.0 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.2.1 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.2.2 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.1.1 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Critical | 5043080 | Security Update | CVE-2024-38119 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Critical | 5043055 | Security Update | CVE-2024-38119 |
Windows 11 Version 23H2 for x64-based Systems | Remote Code Execution | Critical | 5043076 | Security Update | CVE-2024-38119 |
Windows 11 Version 23H2 for ARM64-based Systems | Remote Code Execution | Critical | 5043076 | Security Update | CVE-2024-38119 |
Windows 10 Version 22H2 for 32-bit Systems | Remote Code Execution | Critical | 5043064 | Security Update | CVE-2024-38119 |
Windows 10 Version 22H2 for ARM64-based Systems | Remote Code Execution | Critical | 5043064 | Security Update | CVE-2024-38119 |
Windows 11 Version 22H2 for x64-based Systems | Remote Code Execution | Important | 5043076 | Security Update | CVE-2024-38259 |
Windows 11 Version 22H2 for ARM64-based Systems | Remote Code Execution | Important | 5043076 | Security Update | CVE-2024-38259 |
Windows 11 version 21H2 for ARM64-based Systems | Remote Code Execution | Important | 5043067 | Security Update | CVE-2024-38259 |
Windows 11 version 21H2 for x64-based Systems | Remote Code Execution | Important | 5043067 | Security Update | CVE-2024-38259 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 5042881 | Security Update | CVE-2024-38259 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 5042880 | SecurityHotpatchUpdate | CVE-2024-38259 |
Windows Server 2022 | Remote Code Execution | Important | 5042881 | Security Update | CVE-2024-38259 |
Windows Server 2022 | Remote Code Execution | Important | 5042880 | SecurityHotpatchUpdate | CVE-2024-38259 |
Windows Server 2012 R2 (Server Core installation) | Information Disclosure | Important | 5043138 | Monthly Rollup | CVE-2024-38258 |
Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5043064 | Security Update | CVE-2024-38246 |
Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5043050 | Security Update | CVE-2024-38243 |
Windows Server 2019 | Elevation of Privilege | Important | 5043050 | Security Update | CVE-2024-38243 |
Windows 10 Version 1809 for ARM64-based Systems | Elevation of Privilege | Important | 5043050 | Security Update | CVE-2024-38243 |
Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5043050 | Security Update | CVE-2024-38237 |
Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5043050 | Security Update | CVE-2024-38237 |
Windows Server 2016 (Server Core installation) | Denial of Service | Important | 5043051 | Security Update | CVE-2024-38235 |
Windows Server 2016 | Denial of Service | Important | 5043051 | Security Update | CVE-2024-38235 |
Windows 10 Version 1607 for x64-based Systems | Denial of Service | Important | 5043051 | Security Update | CVE-2024-38235 |
Windows Server 2012 R2 | Security Feature Bypass | Important | 5043138 | Monthly Rollup | CVE-2024-38217 |
Windows Server 2012 (Server Core installation) | Security Feature Bypass | Important | 5043125 | Monthly Rollup | CVE-2024-38217 |
Windows Server 2012 | Security Feature Bypass | Important | 5043125 | Monthly Rollup | CVE-2024-38217 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Security Feature Bypass | Important | 5043129 | Monthly Rollup | CVE-2024-38217 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Security Feature Bypass | Important | 5043092 | Security Only | CVE-2024-38217 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Security Feature Bypass | Important | 5043129 | Monthly Rollup | CVE-2024-38217 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Security Feature Bypass | Important | 5043092 | Security Only | CVE-2024-38217 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Security Feature Bypass | Important | 5043135 | Monthly Rollup | CVE-2024-38217 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Security Feature Bypass | Important | 5043087 | Security Only | CVE-2024-38217 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Security Feature Bypass | Important | 5043135 | Monthly Rollup | CVE-2024-38217 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Security Feature Bypass | Important | 5043087 | Security Only | CVE-2024-38217 |
Microsoft SQL Server 2019 for x64-based Systems (CU 28) | Elevation of Privilege | Important | 5042749 | Security Update | CVE-2024-37341 |
Microsoft SQL Server 2022 for x64-based Systems (CU 14) | Elevation of Privilege | Important | 5042578 | Security Update | CVE-2024-37341 |
Windows 10 Version 21H2 for x64-based Systems | Information Disclosure | Important | 5043064 | Security Update | CVE-2024-38254 |
Windows 10 Version 21H2 for ARM64-based Systems | Information Disclosure | Important | 5043064 | Security Update | CVE-2024-38254 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5043135 | Monthly Rollup | CVE-2024-38249 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5043087 | Security Only | CVE-2024-38249 |
Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | 5043051 | Security Update | CVE-2024-38249 |
Windows 10 for x64-based Systems | Elevation of Privilege | Important | 5043083 | Security Update | CVE-2024-38249 |
Microsoft SQL Server 2022 for x64-based Systems (GDR) | Elevation of Privilege | Important | 5042211 | Security Update | CVE-2024-37980 |
Microsoft SQL Server 2017 for x64-based Systems (CU 31) | Elevation of Privilege | Important | 5042215 | Security Update | CVE-2024-37980 |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 Azure Connect Feature Pack | Elevation of Privilege | Important | 5042209 | Security Update | CVE-2024-37980 |
Microsoft SQL Server 2016 for x64-based Systems Service Pack 3 (GDR) | Elevation of Privilege | Important | 5042207 | Security Update | CVE-2024-37980 |
Microsoft SQL Server 2019 for x64-based Systems (GDR) | Elevation of Privilege | Important | 5042214 | Security Update | CVE-2024-37980 |
Microsoft SQL Server 2017 for x64-based Systems (GDR) | Elevation of Privilege | Important | 5042217 | Security Update | CVE-2024-37980 |
Azure Web Apps | Elevation of Privilege | Critical | CVE-2024-38194 | ||
Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Important | 5040438 | Security Update | CVE-2024-43495 |
Windows 11 Version 23H2 for x64-based Systems | Remote Code Execution | Important | 5040442 | Security Update | CVE-2024-43495 |
Windows 11 Version 23H2 for ARM64-based Systems | Remote Code Execution | Important | 5040442 | Security Update | CVE-2024-43495 |
Windows 11 Version 22H2 for x64-based Systems | Remote Code Execution | Important | 5040442 | Security Update | CVE-2024-43495 |
Windows 11 Version 22H2 for ARM64-based Systems | Remote Code Execution | Important | 5040442 | Security Update | CVE-2024-43495 |
Windows 10 for 32-bit Systems | Remote Code Execution | Critical | 5043083 | Security Update | CVE-2024-43491 |
Windows 10 Version 21H2 for 32-bit Systems | Security Feature Bypass | Moderate | 5043064 | Security Update | CVE-2024-43487 |
Windows Server 2012 R2 | Security Feature Bypass | Important | 5043049 | IE Cumulative | CVE-2024-30073 |
Windows Server 2012 | Security Feature Bypass | Important | 5043049 | IE Cumulative | CVE-2024-30073 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Security Feature Bypass | Important | 5043049 | IE Cumulative | CVE-2024-30073 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Security Feature Bypass | Important | 5043049 | IE Cumulative | CVE-2024-30073 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Security Feature Bypass | Important | 5043049 | IE Cumulative | CVE-2024-30073 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Security Feature Bypass | Important | 5043135 | Monthly Rollup | CVE-2024-30073 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Security Feature Bypass | Important | 5043087 | Security Only | CVE-2024-30073 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Security Feature Bypass | Important | 5043049 | IE Cumulative | CVE-2024-30073 |
Windows 11 Version 24H2 for x64-based Systems | Security Feature Bypass | Important | 5043080 | Security Update | CVE-2024-30073 |
Power Automate for Desktop | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43479 |
Microsoft Dynamics 365 (on-premises) version 9.1 | Spoofing | Important | 5043254 | Security Update | CVE-2024-43476 |
Azure Network Watcher VM Extension for Windows | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2024-43470 |
Azure CycleCloud 8.6.3 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.6.2 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.6.1 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.5.0 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.1.0 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.0.2 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.0.1 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.6.0 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.0.0 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Azure CycleCloud 8.2.0 | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-43469 |
Microsoft SharePoint Server Subscription Edition | Denial of Service | Important | 5002640 | Security Update | CVE-2024-43466 |
Microsoft SharePoint Server 2019 | Denial of Service | Important | 5002639 | Security Update | CVE-2024-43466 |
Microsoft SharePoint Enterprise Server 2016 | Denial of Service | Important | 5002624 | Security Update | CVE-2024-43466 |
Microsoft Publisher 2016 (64-bit edition) | Security Feature Bypass | Important | 5002566 | Security Update | CVE-2024-38226 |
Microsoft Publisher 2016 (32-bit edition) | Security Feature Bypass | Important | 5002566 | Security Update | CVE-2024-38226 |
Microsoft Office LTSC 2021 for 32-bit editions | Security Feature Bypass | Important | Click to Run | Security Update | CVE-2024-38226 |
Microsoft Office LTSC 2021 for 64-bit editions | Security Feature Bypass | Important | Click to Run | Security Update | CVE-2024-38226 |
Microsoft Office 2019 for 64-bit editions | Security Feature Bypass | Important | Click to Run | Security Update | CVE-2024-38226 |
Microsoft Office 2019 for 32-bit editions | Security Feature Bypass | Important | Click to Run | Security Update | CVE-2024-38226 |
Microsoft Dynamics 365 Business Central 2023 Release Wave 2 | Elevation of Privilege | Important | 5042530 | Security Update | CVE-2024-38225 |
Microsoft Dynamics 365 Business Central 2024 Release Wave 1 | Elevation of Privilege | Important | 5042529 | Security Update | CVE-2024-38225 |
Microsoft Dynamics 365 Business Central 2023 Release Wave 1 | Elevation of Privilege | Important | 5042528 | Security Update | CVE-2024-38225 |
Microsoft Excel 2016 (64-bit edition) | Elevation of Privilege | Important | 5002605 | Security Update | CVE-2024-43465 |
Microsoft Excel 2016 (32-bit edition) | Elevation of Privilege | Important | 5002605 | Security Update | CVE-2024-43465 |
Microsoft Office LTSC for Mac 2021 | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2024-43465 |
Microsoft 365 Apps for Enterprise for 64-bit Systems | Elevation of Privilege | Important | Click to Run | Security Update | CVE-2024-43465 |
Microsoft 365 Apps for Enterprise for 32-bit Systems | Elevation of Privilege | Important | Click to Run | Security Update | CVE-2024-43465 |
Microsoft Office Online Server | Elevation of Privilege | Important | 5002601 | Security Update | CVE-2024-43465 |
Microsoft AutoUpdate for Mac | Elevation of Privilege | Important | MAU | Security Update | CVE-2024-43492 |
Outlook for iOS | Information Disclosure | Important | Release Notes | Security Update | CVE-2024-43482 |
Microsoft Visio 2016 (64-bit edition) | Remote Code Execution | Important | 5002634 | Security Update | CVE-2024-43463 |
Microsoft Visio 2016 (32-bit edition) | Remote Code Execution | Important | 5002634 | Security Update | CVE-2024-43463 |
Microsoft Office for Universal | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2024-38250 |
Microsoft Office for Android | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2024-38250 |
Azure Stack Hub | Elevation of Privilege | Critical | Release Notes | Security Update | CVE-2024-38220 |
Microsoft Entra ID | Elevation of Privilege | Critical | CVE-2024-43477 | ||
Microsoft Edge (Chromium-based) | Release Notes | Security Update | CVE-2024-7974 | ||
Microsoft Edge for Android | Spoofing | Moderate | Release Notes | Security Update | CVE-2024-38208 |
Azure Managed Instance for Apache Cassandra | Elevation of Privilege | Critical | XXX | Security Update | CVE-2024-38175 |
Windows Server 2022 | Elevation of Privilege | Important | 5040437 | Security Update | CVE-2024-38186 |
Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5040430 | Security Update | CVE-2024-38186 |
Windows Server 2019 | Elevation of Privilege | Important | 5040430 | Security Update | CVE-2024-38186 |
Windows 10 Version 1809 for ARM64-based Systems | Elevation of Privilege | Important | 5040430 | Security Update | CVE-2024-38186 |
Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5040430 | Security Update | CVE-2024-38186 |
C SDK for Azure IoT | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-38158 |
Azure IoT Hub Device Client SDK | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-38157 |
Windows 11 Version 24H2 for x64-based Systems | Information Disclosure | Important | 5041571 | Security Update | CVE-2024-38155 |
Windows 11 Version 24H2 for ARM64-based Systems | Information Disclosure | Important | 5041571 | Security Update | CVE-2024-38155 |
Windows 11 Version 23H2 for x64-based Systems | Information Disclosure | Important | 5041585 | Security Update | CVE-2024-38155 |
Windows 11 Version 23H2 for ARM64-based Systems | Information Disclosure | Important | 5041585 | Security Update | CVE-2024-38155 |
Windows 10 Version 22H2 for 32-bit Systems | Information Disclosure | Important | 5041580 | Security Update | CVE-2024-38155 |
Windows 10 Version 21H2 for x64-based Systems | Remote Code Execution | Important | 5041580 | Security Update | CVE-2024-38152 |
Windows 10 Version 21H2 for ARM64-based Systems | Remote Code Execution | Important | 5041580 | Security Update | CVE-2024-38152 |
Windows 10 Version 21H2 for 32-bit Systems | Remote Code Execution | Important | 5041580 | Security Update | CVE-2024-38152 |
Windows 11 version 21H2 for ARM64-based Systems | Remote Code Execution | Important | 5041592 | Security Update | CVE-2024-38152 |
Windows 11 version 21H2 for x64-based Systems | Remote Code Execution | Important | 5041592 | Security Update | CVE-2024-38152 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Important | 5041160 | Security Update | CVE-2024-38152 |
Windows Server 2016 | Denial of Service | Important | 5041773 | Security Update | CVE-2024-38146 |
Windows 10 Version 1607 for x64-based Systems | Denial of Service | Important | 5041773 | Security Update | CVE-2024-38146 |
Windows 10 Version 1607 for 32-bit Systems | Denial of Service | Important | 5041773 | Security Update | CVE-2024-38146 |
Windows 10 for x64-based Systems | Denial of Service | Important | 5041782 | Security Update | CVE-2024-38146 |
Windows 10 for 32-bit Systems | Denial of Service | Important | 5041782 | Security Update | CVE-2024-38146 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Denial of Service | Important | 5041573 | Security Update | CVE-2024-38146 |
Windows Server 2022 | Elevation of Privilege | Important | 5041160 | Security Update | CVE-2024-38134 |
Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | 5041578 | Security Update | CVE-2024-38134 |
Windows Server 2012 (Server Core installation) | Elevation of Privilege | Important | 5041851 | Monthly Rollup | CVE-2024-38127 |
Windows Server 2012 | Elevation of Privilege | Important | 5041851 | Monthly Rollup | CVE-2024-38127 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5041838 | Monthly Rollup | CVE-2024-38127 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5041823 | Security Only | CVE-2024-38127 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5041838 | Monthly Rollup | CVE-2024-38127 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5041823 | Security Only | CVE-2024-38127 |
Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5041773 | Security Update | CVE-2024-38127 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5041850 | Monthly Rollup | CVE-2024-38122 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Information Disclosure | Important | 5041847 | Security Only | CVE-2024-38122 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Information Disclosure | Important | 5041850 | Monthly Rollup | CVE-2024-38122 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Information Disclosure | Important | 5041847 | Security Only | CVE-2024-38122 |
Windows 10 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5041580 | Security Update | CVE-2024-38117 |
Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5041580 | Security Update | CVE-2024-38117 |
Windows 11 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5041585 | Security Update | CVE-2024-38117 |
Windows 11 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5041585 | Security Update | CVE-2024-38117 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5041850 | Monthly Rollup | CVE-2024-38114 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Important | 5041847 | Security Only | CVE-2024-38114 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5041850 | Monthly Rollup | CVE-2024-38114 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Important | 5041847 | Security Only | CVE-2024-38114 |
Windows Server 2012 R2 (Server Core installation) | Spoofing | Important | 5041828 | Monthly Rollup | CVE-2024-37968 |
Windows Server 2012 R2 | Spoofing | Important | 5041828 | Monthly Rollup | CVE-2024-37968 |
Windows Server 2019 | Spoofing | Important | 5041578 | Security Update | CVE-2024-37968 |
Azure Health Bot | Elevation of Privilege | Critical | CVE-2024-38109 | ||
Windows 10 Version 1809 for ARM64-based Systems | Elevation of Privilege | Important | 5041578 | Security Update | CVE-2024-38223 |
Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | 5041578 | Security Update | CVE-2024-38223 |
Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5041578 | Security Update | CVE-2024-38223 |
Microsoft Dynamics 365 (on-premises) version 9.1 | Spoofing | Important | 5041557 | Security Update | CVE-2024-38211 |
CBL Mariner 2.0 x64 | grub2 | CBL-Mariner | CVE-2022-3775 | ||
CBL Mariner 2.0 ARM | grub2 | CBL-Mariner | CVE-2022-3775 | ||
CBL Mariner 1.0 x64 | grub2 | CBL-Mariner | CVE-2022-3775 | ||
CBL Mariner 1.0 ARM | grub2 | CBL-Mariner | CVE-2022-3775 | ||
Azure Linux 3.0 x64 | grub2 | CBL-Mariner | CVE-2022-3775 | ||
Azure Linux 3.0 ARM | grub2 | CBL-Mariner | CVE-2022-3775 | ||
Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | 5042320 | Security Update | CVE-2024-38163 |
Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5042320 | Security Update | CVE-2024-38163 |
Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5042320 | Security Update | CVE-2024-38163 |
Windows 10 Version 21H2 for 32-bit Systems | Elevation of Privilege | Important | 5042320 | Security Update | CVE-2024-38163 |
Windows 11 version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5042321 | Security Update | CVE-2024-38163 |
Windows Server 2022 | Elevation of Privilege | Important | 5042322 | Security Update | CVE-2024-38163 |
Microsoft Project 2016 (64-bit edition) | Remote Code Execution | Important | 5002561 | Security Update | CVE-2024-38189 |
Microsoft Project 2016 (32-bit edition) | Remote Code Execution | Important | 5002561 | Security Update | CVE-2024-38189 |
Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | 5040434 | Security Update | CVE-2024-38187 |
Windows Server 2016 | Elevation of Privilege | Important | 5040434 | Security Update | CVE-2024-38187 |
Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | 5040434 | Security Update | CVE-2024-38187 |
Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | 5040434 | Security Update | CVE-2024-38187 |
Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | 5040427 | Security Update | CVE-2024-38187 |
Windows 10 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | 5040427 | Security Update | CVE-2024-38187 |
Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | 5040427 | Security Update | CVE-2024-38187 |
Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5040427 | Security Update | CVE-2024-38187 |
Windows 10 Version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | 5040427 | Security Update | CVE-2024-38187 |
Windows 10 Version 21H2 for 32-bit Systems | Elevation of Privilege | Important | 5040427 | Security Update | CVE-2024-38187 |
Windows 11 version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | 5040431 | Security Update | CVE-2024-38187 |
Windows 11 version 21H2 for x64-based Systems | Elevation of Privilege | Important | 5040431 | Security Update | CVE-2024-38187 |
Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | 5040437 | Security Update | CVE-2024-38187 |
Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | 5040430 | Security Update | CVE-2024-38187 |
App Installer | Spoofing | Important | Release Notes | Security Update | CVE-2024-38177 |
Microsoft Outlook 2016 (64-bit edition) | Remote Code Execution | Important | 5002626 | Security Update | CVE-2024-38173 |
Microsoft Outlook 2016 (32-bit edition) | Remote Code Execution | Important | 5002626 | Security Update | CVE-2024-38173 |
Microsoft PowerPoint 2016 (64-bit edition) | Remote Code Execution | Important | 5002586 | Security Update | CVE-2024-38171 |
Microsoft PowerPoint 2016 (32-bit edition) | Remote Code Execution | Important | 5002586 | Security Update | CVE-2024-38171 |
Azure Connected Machine Agent | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2024-38162 |
Windows Server 2019 (Server Core installation) | Remote Code Execution | Important | 5043126 | ServicingStackUpdate | CVE-2024-38138 |
Windows Server 2019 | Remote Code Execution | Important | 5043126 | ServicingStackUpdate | CVE-2024-38138 |
Remote Desktop client for Windows Desktop | Remote Code Execution | Important | Release Notes | Security Update | CVE-2024-38131 |
Microsoft OfficePLUS | Elevation of Privilege | Important | Release Notes | Security Update | CVE-2024-38084 |
Windows Server 2012 R2 (Server Core installation) | Security Feature Bypass | Moderate | 5039294 | Monthly Rollup | CVE-2024-38213 |
Windows Server 2012 R2 | Security Feature Bypass | Moderate | 5039294 | Monthly Rollup | CVE-2024-38213 |
Windows Server 2012 (Server Core installation) | Security Feature Bypass | Moderate | 5039260 | Monthly Rollup | CVE-2024-38213 |
Windows Server 2012 | Security Feature Bypass | Moderate | 5039260 | Monthly Rollup | CVE-2024-38213 |
Windows Server 2016 (Server Core installation) | Security Feature Bypass | Moderate | 5039214 | Security Update | CVE-2024-38213 |
Windows Server 2016 | Security Feature Bypass | Moderate | 5039214 | Security Update | CVE-2024-38213 |
Windows 10 Version 1607 for x64-based Systems | Security Feature Bypass | Moderate | 5039214 | Security Update | CVE-2024-38213 |
Windows 10 Version 1607 for 32-bit Systems | Security Feature Bypass | Moderate | 5039214 | Security Update | CVE-2024-38213 |
Windows 10 for x64-based Systems | Security Feature Bypass | Moderate | 5039225 | Security Update | CVE-2024-38213 |
Windows 10 for 32-bit Systems | Security Feature Bypass | Moderate | 5039225 | Security Update | CVE-2024-38213 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Security Feature Bypass | Moderate | 5039236 | Security Update | CVE-2024-38213 |
Windows 11 Version 23H2 for x64-based Systems | Security Feature Bypass | Moderate | 5039212 | Security Update | CVE-2024-38213 |
Windows 11 Version 23H2 for ARM64-based Systems | Security Feature Bypass | Moderate | 5039212 | Security Update | CVE-2024-38213 |
Windows 10 Version 22H2 for 32-bit Systems | Security Feature Bypass | Moderate | 5039211 | Security Update | CVE-2024-38213 |
Windows 10 Version 22H2 for ARM64-based Systems | Security Feature Bypass | Moderate | 5039211 | Security Update | CVE-2024-38213 |
Windows 10 Version 22H2 for x64-based Systems | Security Feature Bypass | Moderate | 5039211 | Security Update | CVE-2024-38213 |
Windows 11 Version 22H2 for x64-based Systems | Security Feature Bypass | Moderate | 5039212 | Security Update | CVE-2024-38213 |
Windows 11 Version 22H2 for ARM64-based Systems | Security Feature Bypass | Moderate | 5039212 | Security Update | CVE-2024-38213 |
Windows 10 Version 21H2 for x64-based Systems | Security Feature Bypass | Moderate | 5039211 | Security Update | CVE-2024-38213 |
Windows 10 Version 21H2 for ARM64-based Systems | Security Feature Bypass | Moderate | 5039211 | Security Update | CVE-2024-38213 |
Windows 10 Version 21H2 for 32-bit Systems | Security Feature Bypass | Moderate | 5039211 | Security Update | CVE-2024-38213 |
Windows 11 version 21H2 for ARM64-based Systems | Security Feature Bypass | Moderate | 5039213 | Security Update | CVE-2024-38213 |
Windows 11 version 21H2 for x64-based Systems | Security Feature Bypass | Moderate | 5039213 | Security Update | CVE-2024-38213 |
Windows Server 2022 (Server Core installation) | Security Feature Bypass | Moderate | 5039227 | Security Update | CVE-2024-38213 |
Windows Server 2022 (Server Core installation) | Security Feature Bypass | Moderate | 5039330 | Security Hotpatch Update | CVE-2024-38213 |
Windows Server 2022 | Security Feature Bypass | Moderate | 5039227 | Security Update | CVE-2024-38213 |
Windows Server 2022 | Security Feature Bypass | Moderate | 5039330 | Security Hotpatch Update | CVE-2024-38213 |
Windows Server 2019 (Server Core installation) | Security Feature Bypass | Moderate | 5039217 | Security Update | CVE-2024-38213 |
Windows Server 2019 | Security Feature Bypass | Moderate | 5039217 | Security Update | CVE-2024-38213 |
Windows 10 Version 1809 for ARM64-based Systems | Security Feature Bypass | Moderate | 5039217 | Security Update | CVE-2024-38213 |
Windows 10 Version 1809 for x64-based Systems | Security Feature Bypass | Moderate | 5039217 | Security Update | CVE-2024-38213 |
Windows 10 Version 1809 for 32-bit Systems | Security Feature Bypass | Moderate | 5039217 | Security Update | CVE-2024-38213 |
Microsoft Teams for iOS | Spoofing | Important | Release Notes | Security Update | CVE-2024-38197 |
Windows Server 2012 R2 (Server Core installation) | Elevation of Privilege | Important | 5040456 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2012 R2 | Elevation of Privilege | Important | 5040456 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2012 (Server Core installation) | Elevation of Privilege | Important | 5040485 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2012 | Elevation of Privilege | Important | 5040485 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5040497 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Elevation of Privilege | Important | 5040498 | Security Only | CVE-2024-38191 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5040497 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Elevation of Privilege | Important | 5040498 | Security Only | CVE-2024-38191 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5040499 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5040490 | Security Only | CVE-2024-38191 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5040499 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Elevation of Privilege | Important | 5040490 | Security Only | CVE-2024-38191 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5040499 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Elevation of Privilege | Important | 5040490 | Security Only | CVE-2024-38191 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5040499 | Monthly Rollup | CVE-2024-38191 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Elevation of Privilege | Important | 5040490 | Security Only | CVE-2024-38191 |
Windows 10 for x64-based Systems | Elevation of Privilege | Important | 5040448 | Security Update | CVE-2024-38191 |
Windows 10 for 32-bit Systems | Elevation of Privilege | Important | 5040448 | Security Update | CVE-2024-38191 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Important | 5041770 | IE Cumulative | CVE-2024-38178 |
Windows Server 2012 R2 | Remote Code Execution | Important | 5041770 | IE Cumulative | CVE-2024-38178 |
Microsoft Visual Studio 2022 version 17.8 | Denial of Service | Important | Release Notes | Security Update | CVE-2024-38168 |
Microsoft Visual Studio 2022 version 17.10 | Denial of Service | Important | Release Notes | Security Update | CVE-2024-38168 |
Microsoft Visual Studio 2022 version 17.6 | Denial of Service | Important | Release Notes | Security Update | CVE-2024-38168 |
.NET 8.0 | Denial of Service | Important | 5042132 | Security Update | CVE-2024-38168 |
Microsoft Office 2016 (64-bit edition) | Spoofing | Important | 5002625 | Security Update | CVE-2024-38200 |
Microsoft Office 2016 (64-bit edition) | Spoofing | Important | 5002570 | Security Update | CVE-2024-38200 |
Microsoft Office 2016 (32-bit edition) | Spoofing | Important | 5002625 | Security Update | CVE-2024-38200 |
Microsoft Office 2016 (32-bit edition) | Spoofing | Important | 5002570 | Security Update | CVE-2024-38200 |
Windows Server 2016 (Server Core installation) | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows Server 2016 | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 1607 for x64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 1607 for 32-bit Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows Server 2022, 23H2 Edition (Server Core installation) | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 11 Version 23H2 for x64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 11 Version 23H2 for ARM64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 22H2 for 32-bit Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 11 Version 22H2 for x64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 11 Version 22H2 for ARM64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 21H2 for x64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 21H2 for 32-bit Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 11 version 21H2 for ARM64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 11 version 21H2 for x64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows Server 2022 (Server Core installation) | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows Server 2022 | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows Server 2019 (Server Core installation) | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows Server 2019 | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 1809 for ARM64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 1809 for x64-based Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Windows 10 Version 1809 for 32-bit Systems | Elevation of Privilege | Important | CVE-2024-38202 | ||
Microsoft Copilot Studio | Information Disclosure | Critical | CVE-2024-38206 | ||
Dynamics CRM Service Portal Web Resource | Spoofing | Critical | CVE-2024-38166 | ||
Microsoft has released the KB5043080 and KB5043076 patches for Windows 11 versions 24H2 as well as versions 23H2 and 22H2, respectively. These updates allow users to use Windows Share to share content to linked Android devices. Microsoft has also started rolling out new APIs that let third-party developers create new widget feeds in the EU.
For Windows 10 users, Microsoft has released the KB5043064 patch to address a bug that was previously causing apps to stop responding due to memory leak in Bluetooth devices. The company has also fixed an issue that was cauing the Microsoft System Center Configuration Manager (SCCM) task to re-enable Unified Write Filter (UWF) fail due to a deadlock in UWF. This bug prevents users from rebooting their devices.
Organizations looking to deploy this month’s patches should conduct thorough testing before deploying them widely on production systems. That said, applying the patches widely shouldn’t be delayed longer than necessary as hackers start to work out how to weaponize newly reported vulnerabilities.
A best practice is to make sure you have backed up systems before applying updates. Every month, users experience issues with Windows updates that lead to systems not booting, application and hardware compatibility issues, or even data loss in extreme cases.
There are backup tools built into Windows and Windows Server that you can use to restore systems in the event a patch causes a problem. The backup features in Windows can be used to restore an entire system, or files and folders on a granular basis.