Need cloud computing? Get started now

Akamai’s Perspective on September’s Patch Tuesday 2024

In addition to the exploited-in-the-wild CVEs, there was another CVE patched this month, CVE-2024-43487, with a CVSS score of 6.5.
In addition to the exploited-in-the-wild CVEs, there was another CVE patched this month, CVE-2024-43487, with a CVSS score of 6.5.

Let’s get back to school, everybody! Our major — CVE analysis. As we do every month, the Akamai Security Intelligence Group set out to look at the more intriguing vulnerabilities that were patched.

In this blog post, we’ll assess how critical the vulnerabilities are, and how commonplace the affected applications and services are, to provide you with a realistic perspective on the bugs that were fixed. Be on the lookout for these insights in the days after every Patch Tuesday.

This is an ongoing report and we’ll add more information to it as our research progresses — stay tuned!

This month, we’re focusing on the following areas in which bugs were patched

Vulnerabilities discovered in the wild

CVE-2024-43491 — Microsoft Windows Update (CVSS 9.8)

An issue with March’s security update’s build number triggered a bug in the part of Windows Update that handles optional components. This caused Windows Update to determine that subsequent updates were not applicable, and revert those components to their base versions. 

According to Microsoft, the bug in Windows Update wasn’t publicly exploited, but some of the affected components had publicly exploited vulnerabilities, hence the categorizations.

To deal with this CVE, you should install both the security update KB5043083 and servicing stack update KB5043936.

The affected components are:

  • Active Directory Lightweight Directory Services

  • Administrative Tools

  • ASP.NET 4.6

  • Internet Explorer 11

  • Internet Information Services

  • LPD Print Service

  • Microsoft Message Queue (MSMQ) Server Core

  • MSMQ HTTP Support

  • MultiPoint Connector

  • SMB 1.0/CIFS File Sharing Support

  • Windows Fax and Scan

  • Windows Media Player

  • Work Folders Client

  • XPS Viewer

You can check if any of those components are enabled on your computer by using the following OSQuery:

  SELECT
    name, caption, statename
  FROM 
    windows_optional_features
  WHERE
    caption IN (
        'Active Directory Lightweight Directory Services',
        'Administrative Tools',
        'ASP.NET 4.6',
        'Internet Explorer 11',
        'Internet Information Services',
        'LPD Print Service',
        'Microsoft Message Queue (MSMQ) Server Core',
        'MSMQ HTTP Support',
        'MultiPoint Connector',
        'SMB 1.0/CIFS File Sharing Support',
        'Windows Fax and Scan',
        'Windows Media Player',
        'Work Folders Client',
        'XPS Viewer'
    )
    AND state = 1

CVE-2024-38014 — Windows Installer (CVSS 7.8)

The Windows Installer (msiexec.exe) is the component in Windows that is responsible for handling and installing .msi files. There aren’t many details regarding this vulnerability, but given that successful exploitation results in SYSTEM privileges, the issue might be with the Windows Installer service (which points to msiexec as well) and not just the binary.

CVE-2024-38226 — Microsoft Publisher Security Features (CVSS 7.3)

The Microsoft Publisher security features are meant to protect users from harmful, malicious Microsoft Office documents. Attackers can embed malicious pieces of code, in the form of macros, in Office documents. The Publisher Security features prevent the automatic execution of macros, and instead presents the users with a pop-up message to confirm their execution.

CVE-2024-38226 is a bypass of those protections, allowing malicious code to run automatically when the document is opened.

CVE-2024-38217 — Windows Mark of the Web (CVSS 5.4)

For the second month in a row, there’s another Mark of the Web bypass. Mark of the Web is the security feature that is responsible for marking potentially dangerous files downloaded from the internet, which triggers the SmartScreen security warning when opening them. This bypass skips that warning. The vulnerability requires the attacker to craft a file in a specific way that will cause Windows SmartScreen to fail to check the file and, therefore, to bypass the warning screen.

Last month was not the first time SmartScreen bypass vulnerabilities were actively exploited by threat actors. The November 2023 and February 2024 patches also included fixes for bypass vulnerabilities that were reported as actively exploited.

In addition to the exploited-in-the-wild CVEs, there was another CVE patched this month, CVE-2024-43487, with a CVSS score of 6.5.

Microsoft SharePoint Server

Microsoft SharePoint is a web-based document management and storage system that integrates with other Microsoft Office products. There are five CVEs this month, two critical remote code execution (RCE) vulnerabilities with CVSS scores of 8.8 (CVE-2024-38018) and 7.2 (CVE-2024-43464). The others are two more RCE vulnerabilities and a denial-of-service (DoS) CVE.

CVE-2024-38018 requires attackers to authenticate to the SharePoint server with an account that has at least SiteMember permissions. There are no details on what the attacker has to do to trigger code execution.

CVE-2024-43464, CVE-2024-38227, and CVE-2024-38228 require SiteOwner permissions. They also require uploading a crafted file and accessing it via an API request. This would trigger a deserialization of file parameters and cause code injection into the SharePoint server process.

In our observations, we’ve seen that approximately 30% of environments had at least one machine with a SharePoint server installed on it.

Since SharePoint servers are usually meant to be used for document sharing, it might be difficult to segment or limit user access to them without harming normal operations. Therefore, we recommend that you patch your server as soon as possible.

However, since the RCE CVEs require user authentication, it may be possible to mitigate some of the risks by hardening user access, or by increasing alert sensitivity on suspicious user activity or logins.

Windows network address translation (NAT)

Network address translation (NAT) is a form of networking that maps multiple IP addresses behind a single IP address. Its main use is network separation, by putting the whole internal network IP range behind a single external IP.

This month, CVE-2024-38119 is a critical RCE vulnerability in Windows NAT, which requires winning a race condition to exploit successfully. It is unclear which specific component in Windows is responsible for NAT, and since NAT occurs before the typical network stack, segmentation is probably not a possible mitigation. As such, we recommend patching as the only mitigation.

Microsoft SQL Server

There are 13 CVEs in Microsoft SQL Server (MSSQL) server this month. Nine of those are for the Native Scoring feature in MSSQL (which is a machine learning feature to predict data values based on pre-trained models); of those nine, six are RCEs. And there are another four CVEs in the native MSSQL server.

As SQL servers typically hold sensitive information, they should be segmented and have access control restrictions placed on them to prevent data theft incidents. If you don’t have such policies in place, this is a good opportunity to add them. Map your existing MSSQL servers (either by looking for the MSSQL service, or by looking for connections over ports 1433 and1434).

After mapping existing servers, create segmentation policies based on the existing traffic and other segments that should have access (like IT to all, or finance to finance, etc.). This is also a good opportunity to see who's being naughty and accessing databases they shouldn’t touch.

From our observations, 75% of networks have MSSQL servers.

Service

CVE number

Effect

Microsoft SQL Server Native Scoring

CVE-2024-37338

Remote code execution

CVE-2024-37335

CVE-2024-37340

CVE-2024-37339

CVE-2024-26186

CVE-2024-26191

CVE-2024-37966

Information disclosure

CVE-2024-37337

CVE-2024-37342

Microsoft SQL Server

CVE-2024-43474

CVE-2024-37965

Elevation of privilege

CVE-2024-37341

CVE-2024-37980

Previously covered services

Many CVEs in this month’s Patch Tuesday are for systems that we’ve already covered in the past. If you’re interested in our analysis of, or general recommendations for, those services, we encourage you to look at our previous perspectives on Patch Tuesday blog posts.

Service

CVE number

Effect

Required access

DHCP Server Service

CVE-2024-38236

Denial of service

Network

Windows Remote Access Connection Manager

CVE-2024-38240

Elevation of privilege

Network

Windows TCP/IP

CVE-2024-21416

Remote code execution

Network, with the NetNAT service enabled

CVE-2024-38045

Windows MSHTML platform

CVE-2024-43461

Spoofing

Network

Windows Remote Desktop Licensing Service

CVE-2024-43467

Remote code execution

Network, any authenticated user

CVE-2024-38260

CVE-2024-38263

CVE-2024-43454

CVE-2024-38258

Information disclosure

Network

CVE-2024-38231

Denial of service

CVE-2024-43455

Spoofing

This summary provides an overview of our current understanding and our recommendations given the information available. Our review is ongoing and any information herein is subject to change. You can also visit us on X, formerly known as Twitter, for real-time updates.