Rewterz Threat Advisory – Multiple Apache Products Vulnerabilities
March 14, 2024Rewterz Threat Alert – New DarkGate Malware Campaign Exploits Windows SmartScreen Vulnerability to Bypass Security – Active IOCs
March 14, 2024Rewterz Threat Advisory – Multiple Apache Products Vulnerabilities
March 14, 2024Rewterz Threat Alert – New DarkGate Malware Campaign Exploits Windows SmartScreen Vulnerability to Bypass Security – Active IOCs
March 14, 2024Severity
High
Analysis Summary
CVE-2024-26199 CVSS:7.8
Microsoft Office could allow a local authenticated attacker to gain elevated privileges on the system. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to obtain SYSTEM privileges.
CVE-2024-21426 CVSS:7.8
Microsoft SharePoint Server could allow a remote attacker to execute arbitrary code on the system. By persuading a victim to open a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-21436 CVSS:7.4
Microsoft Windows could allow a local attacker to gain elevated privileges on the system, caused by a flaw in the Installer component. By executing a specially crafted program, an attacker could exploit this vulnerability to delete files on the system.
CVE-2024-21392 CVSS:7.5
Microsoft ASP.NET Core and Visual Studio are vulnerable to a denial of service. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2024-26159 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the ODBC Driver component. By persuading a victim to connect to a malicious SQL database, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-21438 CVSS:7.5
Microsoft Windows is vulnerable to a denial of service, caused by a flaw in the AllJoyn API component. By sending a specially crafted request, a remote attacker could exploit this vulnerability to cause a denial of service condition.
CVE-2024-21427 CVSS:7.5
Microsoft Windows could allow a remote authenticated attacker to bypass security restrictions, caused by a flaw in the Kerberos component. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass the authentication feature.
CVE-2024-21418 CVSS:7.8
Microsoft Software for Open Networking in the Cloud (SONiC) could allow a local authenticated attacker to gain elevated privileges on the system. By sending a specially crafted request, an authenticated attacker could exploit this vulnerability to obtain root privileges in the Border Gateway Protocol container.
CVE-2024-21451 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the ODBC Driver component. By persuading a victim to connect to a malicious SQL database, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-21435 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the OLE component. By using a specially crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-26164 CVSS:8.8
Microsoft SQL Server backend for Django could allow a remote authenticated attacker to execute arbitrary code on the system. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-21440 CVSS:8.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the ODBC Driver component. By persuading a victim to connect to a malicious SQL database, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Impact
- Privilege Escalation
- Gain Access
- Denial of Service
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2024-26199
- CVE-2024-21426
- CVE-2024-21436
- CVE-2024-21392
- CVE-2024-26159
- CVE-2024-21438
- CVE-2024-21427
- CVE-2024-21418
- CVE-2024-21451
- CVE-2024-21435
- CVE-2024-26164
- CVE-2024-21440
Affected Vendors
Microsoft
Affected Products
- Microsoft Windows Server 2016
- Microsoft Windows Server 2019
- Microsoft Windows 10 for 32-bit Systems
- Microsoft Windows 10 for x64-based Systems
- Microsoft Windows Server 2012
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2022
- Microsoft Visual Studio 2022 17.4
- Microsoft Visual Studio 2022 17.6
- Microsoft Windows Server 2019 (Server Core installation)
- Microsoft Windows Server 2022 (Server Core installation)
- Microsoft Visual Studio 2022 17.8
- Microsoft Windows 10 Version 1607 for 32-bit Systems 1607
- Microsoft Windows 10 Version 1607 for x64-based Systems 1607
- Microsoft Windows 10 Version 1809 for 32-bit Systems 1809
- Microsoft Windows 10 Version 1809 for ARM64-based Systems 1809
- Microsoft Windows 10 Version 1809 for x64-based Systems 1809
- Microsoft Windows 10 Version 21H2 for 32-bit Systems 21H2
- Microsoft Windows 10 Version 21H2 for ARM64-based Systems 21H2
- Microsoft Windows 10 Version 21H2 for x64-based Systems 21H2
- Microsoft Windows 10 Version 22H2 for 32-bit Systems 22H2
- Microsoft Windows 10 Version 22H2 for ARM64-based Systems 22H2
- Microsoft Windows 10 Version 22H2 for x64-based Systems 22H2
- Microsoft Windows 11 version 21H2 for ARM64-based Systems
- Microsoft Windows 11 version 21H2 for x64-based Systems
- Microsoft Windows 11 Version 22H2 for ARM64-based Systems 22H2
- Microsoft Windows 11 Version 22H2 for x64-based Systems 22H2
- Microsoft Windows 11 Version 23H2 for ARM64-based Systems 23H2
- Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2
- Microsoft Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1
- Microsoft Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
- Microsoft Windows Server 2012 (Server Core installation)
- Microsoft Windows Server 2012 R2 (Server Core installation)
- Microsoft Windows Server 2016 (Server Core installation)
- Microsoft SQL Server backend for Django
- Microsoft Visual Studio 2022 17.9
- Microsoft Software for Open Networking in the Cloud (SONiC)
- Microsoft Microsoft SharePoint Server Subscription Edition
- Microsoft Microsoft SharePoint Server 2019
- Microsoft Microsoft SharePoint Enterprise Server 2016
- Microsoft Microsoft 365 Apps for Enterprise for 64-bit Systems
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.