2024’s first Patch Tuesday steps lightly – Sophos News


Impact

  • Information Disclosure: 12
  • Remote Code Execution: 11
  • Elevation of Privilege: 10
  • Denial of Service: 6
  • Security Feature Bypass: 6
  • Spoofing: 3

 

A bar chart showing the distribution of January 2024 patches by impact, then severity; information conveyed in article text

Figure 1: You’re reading the labels correctly: Information-disclosure issues outnumber both EoP and RCE bugs in January. Security feature bypass issues – one of them Critical-severity — also make a strong showing

Products

  • Windows: 38
  • .NET: 5 (including on shared with Visual Studio; one shared with Microsoft Identity Model / NuGet and Visual Studio; and one shared with Azure, SQL Server, and Visual Studio)
  • Visual Studio: 4 (including one shared with .NET; one shared with .NET and Microsoft Identity Model / NuGet; and one shared with .NET, Azure, and SQL Server)
  • Azure: 2 (including one shared with .NET, SQL Server, and Visual Studio)
  • Microsoft Identity Model / NuGet: 1 (shared with .NET and Visual Studio)
  • Microsoft Printer Metadata Troubleshooter Tool: 1
  • Office: 1
  • SharePoint: 1
  • SQL Server: 1 (shared with .NET, Azure, and Visual Studio)

A bar chart showing distribution of January 2024 patches by product family; information conveyed in text

Figure 2: Windows is heavily represented in this month’s patches, but several less-familiar tools and applications are also in the mix (full names shown in tables below)

Notable January updates

In addition to the issues discussed above, a few specific items are worth noting.

CVE-2024-0057 — .NET, .NET Framework, and Visual Studio Framework Security Feature Bypass Vulnerability
CVE-2024-20674 — Windows Kerberos Security Feature Bypass Vulnerability

Of this pair of security feature bypass issues, Microsoft deems only the Kerberos issue to be Critical-class. The CVSS scoring system begs to differ, since the guide to that scoring system requires that scorers consider feasible worst-case scenarios when evaluating bugs in software libraries. Their CVSS base scores are thus 9.1 and 9.0 respectively. In any case, admins are encouraged to prioritize these two patches.

CVE-2024-20696 – Windows Libarchive Remote Code Execution Vulnerability
CVE-2024-20697 – Windows Libarchive Remote Code Execution Vulnerability

The information available on these two identically named Important-class RCEs is scant, but there’s a big clue to their importance in the title: These two issues affect Libarchive, the engine for reading and writing in various compression and archive formats.

CVE-2024-20666 – BitLocker Security Feature Bypass Vulnerability

Another security feature bypass, this time in a security feature. This issue stands out for some fairly nuanced requirements around servicing the Safe OS; for most versions of Windows 11 this is now a fully automated process, and those relying on WSUS are automatically updated, but those working in more complex environments are strongly encouraged to check Microsoft’s published guidance for specific instructions. In any case, the attacker requires physical access to the targeted machine.

CVE-2024-21305 — Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability

The CVE with the lowest CVSS base score this month has something in common with the two highest-scoring CVEs: It’s yet another security feature bypass. This one, however, rates a mere 4.4 base score and requires the attacker to have physical access to the targeted machine and to have previously compromised admin credentials. It affects an assortment of Windows client and server versions and, for those still running that hardware, 15 versions of the Surface.

Sophos protections

CVE Sophos Intercept X/Endpoint IPS Sophos XGS Firewall
CVE-2024-20653 Exp/2420653-A Exp/2420653-A
CVE-2024-20698 Exp/2420698-A Exp/2420698-A
CVE-2024-21307 Exp/2421307-A Exp/2421307-A
CVE-2024-21310 Exp/2421310-A Exp/2421310-A

 

As you can every month, if you don’t want to wait for your system to pull down Microsoft’s updates itself, you can download them manually from the Windows Update Catalog website. Run the winver.exe tool to determine which build of Windows 10 or 11 you’re running, then download the Cumulative Update package for your specific system’s architecture and build number.

Appendix A: Vulnerability Impact and Severity

This is a list of January patches sorted by impact, then sub-sorted by severity. Each list is further arranged by CVE.

Information Disclosure (12 CVEs)

Important severity
CVE-2024-0056 Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Information Disclosure Vulnerability
CVE-2024-20660 Windows Message Queuing Client Information Disclosure Vulnerability
CVE-2024-20662 Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability
CVE-2024-20663 Windows Message Queuing Client (MSMQC) Information Disclosure
CVE-2024-20664 Microsoft Message Queuing Client Information Disclosure Vulnerability
CVE-2024-20680 Windows Message Queuing Client (MSMQC) Information Disclosure
CVE-2024-20691 Windows Themes Information Disclosure Vulnerability
CVE-2024-20692 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVE-2024-20694 Windows CoreMessaging Information Disclosure  Vulnerability
CVE-2024-21311 Windows Cryptographic Services Information Disclosure Vulnerability
CVE-2024-21313 Windows TCP/IP Information Disclosure Vulnerability
CVE-2024-21314 Windows Message Queuing Client (MSMQC) Information Disclosure

 

Remote Code Execution (11 CVEs)

Critical severity
CVE-2024-20700 Windows Hyper-V Remote Code Execution Vulnerability
Important severity
CVE-2024-20654 Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2024-20655 Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability
CVE-2024-20676 Azure Storage Mover Remote Code Execution Vulnerability
CVE-2024-20677 Microsoft Office Remote Code Execution Vulnerability
CVE-2024-20682 Windows Cryptographic Services Remote Code Execution Vulnerability
CVE-2024-20696 Windows Libarchive Remote Code Execution Vulnerability
CVE-2024-20697 Windows Libarchive Remote Code Execution Vulnerability
CVE-2024-21307 Remote Desktop Client Remote Code Execution Vulnerability
CVE-2024-21318 Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-21325 Microsoft Printer Metadata Troubleshooter Tool Remote Code Execution Vulnerability

 

Elevation of Privilege (10 CVEs)

Important severity
CVE-2024-20653 Microsoft Common Log File System Elevation of Privilege Vulnerability
CVE-2024-20656 Visual Studio Elevation of Privilege Vulnerability
CVE-2024-20657 Windows Group Policy Elevation of Privilege Vulnerability
CVE-2024-20658 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
CVE-2024-20681 Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2024-20683 Win32k Elevation of Privilege Vulnerability
CVE-2024-20686 Win32k Elevation of Privilege Vulnerability
CVE-2024-20698 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21309 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-21310 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

 

Denial of Service (6 CVEs)

Important severity
CVE-2024-20661 Microsoft Message Queuing Denial of Service Vulnerability
CVE-2024-20672 .NET Core and Visual Studio Denial of Service Vulnerability
CVE-2024-20687 Microsoft AllJoyn API Denial of Service Vulnerability
CVE-2024-20699 Windows Hyper-V Denial of Service Vulnerability
CVE-2024-21312 .NET Framework Denial of Service Vulnerability
CVE-2024-21319 Microsoft Identity Denial of Service Vulnerability

 

Security Feature Bypass (6 CVEs)

Critical severity
CVE-2024-20674 Windows Kerberos Security Feature Bypass Vulnerability
Important Severity
CVE-2024-0057 .NET, .NET Framework, and Visual Studio Framework Security Feature Bypass Vulnerability
CVE-2024-20652 Windows HTML Platforms Security Feature Bypass Vulnerability
CVE-2024-20666 BitLocker Security Feature Bypass Vulnerability
CVE-2024-21305 Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability
CVE-2024-21316 Windows Server Key Distribution Service Security Feature Bypass

 

Spoofing (3 CVEs)

Important severity
CVE-2024-20690 Windows Nearby Sharing Spoofing Vulnerability
CVE-2024-21306 Microsoft Bluetooth Driver Spoofing Vulnerability
CVE-2024-21320 Windows Themes Spoofing Vulnerability

 

Appendix B: Exploitability

This is a list of the January CVEs judged by Microsoft to be more likely to be exploited in the wild within the first 30 days post-release. Each list is further arranged by CVE. No CVEs addressed in the January patch collection are known to be under active exploit in the wild yet.

Exploitation more likely within 30 days
CVE-2024-20652 Windows HTML Platforms Security Feature Bypass Vulnerability
CVE-2024-20653 Microsoft Common Log File System Elevation of Privilege Vulnerability
CVE-2024-20674 Windows Kerberos Security Feature Bypass Vulnerability
CVE-2024-20683 Win32k Elevation of Privilege Vulnerability
CVE-2024-20686 Win32k Elevation of Privilege Vulnerability
CVE-2024-20698 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21307 Remote Desktop Client Remote Code Execution Vulnerability
CVE-2024-21310 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2024-21318 Microsoft SharePoint Server Remote Code Execution Vulnerability

 

 Appendix C: Products Affected

This is a list of December’s patches sorted by product family, then sub-sorted by severity. Each list is further arranged by CVE. Patches that are shared among multiple product families are listed multiple times, once for each product family.

Windows (38 CVEs)

Critical severity
CVE-2024-20674 Windows Kerberos Security Feature Bypass Vulnerability
CVE-2024-20700 Windows Hyper-V Remote Code Execution Vulnerability
Important severity
CVE-2024-20652 Windows HTML Platforms Security Feature Bypass Vulnerability
CVE-2024-20653 Microsoft Common Log File System Elevation of Privilege Vulnerability
CVE-2024-20654 Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2024-20655 Microsoft Online Certificate Status Protocol (OCSP) Remote Code Execution Vulnerability
CVE-2024-20657 Windows Group Policy Elevation of Privilege Vulnerability
CVE-2024-20658 Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
CVE-2024-20660 Windows Message Queuing Client Information Disclosure Vulnerability
CVE-2024-20661 Microsoft Message Queuing Denial of Service Vulnerability
CVE-2024-20662 Windows Online Certificate Status Protocol (OCSP) Information Disclosure Vulnerability
CVE-2024-20663 Windows Message Queuing Client (MSMQC) Information Disclosure
CVE-2024-20664 Microsoft Message Queuing Client Information Disclosure Vulnerability
CVE-2024-20666 BitLocker Security Feature Bypass Vulnerability
CVE-2024-20680 Windows Message Queuing Client (MSMQC) Information Disclosure
CVE-2024-20681 Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2024-20682 Windows Cryptographic Services Remote Code Execution Vulnerability
CVE-2024-20683 Win32k Elevation of Privilege Vulnerability
CVE-2024-20686 Win32k Elevation of Privilege Vulnerability
CVE-2024-20687 Microsoft AllJoyn API Denial of Service Vulnerability
CVE-2024-20690 Windows Nearby Sharing Spoofing Vulnerability
CVE-2024-20691 Windows Themes Information Disclosure Vulnerability
CVE-2024-20692 Microsoft Local Security Authority Subsystem Service Information Disclosure Vulnerability
CVE-2024-20694 Windows CoreMessaging Information Disclosure  Vulnerability
CVE-2024-20696 Windows Libarchive Remote Code Execution Vulnerability
CVE-2024-20697 Windows Libarchive Remote Code Execution Vulnerability
CVE-2024-20698 Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-20699 Windows Hyper-V Denial of Service Vulnerability
CVE-2024-21305 Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability
CVE-2024-21306 Microsoft Bluetooth Driver Spoofing Vulnerability
CVE-2024-21307 Remote Desktop Client Remote Code Execution Vulnerability
CVE-2024-21309 Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-21310 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2024-21311 Windows Cryptographic Services Information Disclosure Vulnerability
CVE-2024-21313 Windows TCP/IP Information Disclosure Vulnerability
CVE-2024-21314 Windows Message Queuing Client (MSMQC) Information Disclosure
CVE-2024-21316 Windows Server Key Distribution Service Security Feature Bypass
CVE-2024-21320 Windows Themes Spoofing Vulnerability

 

.NET (5 CVEs)

Important severity
CVE-2024-0056 Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Information Disclosure Vulnerability
CVE-2024-0057 .NET, .NET Framework, and Visual Studio Framework Security Feature Bypass Vulnerability
CVE-2024-20672 .NET Core and Visual Studio Denial of Service Vulnerability
CVE-2024-21312 .NET Framework Denial of Service Vulnerability
CVE-2024-21319 Microsoft Identity Denial of Service Vulnerability

 

Visual Studio (4 CVEs)

Important severity
CVE-2024-0056 Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Information Disclosure Vulnerability
CVE-2024-0057 .NET, .NET Framework, and Visual Studio Framework Security Feature Bypass Vulnerability
CVE-2024-20656 Visual Studio Elevation of Privilege Vulnerability
CVE-2024-21319 Microsoft Identity Denial of Service Vulnerability

 

Azure (2 CVEs)

Important severity
CVE-2024-0056 Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Information Disclosure Vulnerability
CVE-2024-20676 Azure Storage Mover Remote Code Execution Vulnerability

 

Microsoft Identity Model (1 CVE)

Important severity
CVE-2024-21319 Microsoft Identity Denial of Service Vulnerability

 

Microsoft Printer Metadata Troubleshooter Tool (1 CVE)

Important severity
CVE-2024-21325 Microsoft Printer Metadata Troubleshooter Tool Remote Code Execution Vulnerability

 

Office (1 CVE)

Important severity
CVE-2024-20677 Microsoft Office Remote Code Execution Vulnerability

 

SharePoint (1 CVE)

Important severity
CVE-2024-21318 Microsoft SharePoint Server Remote Code Execution Vulnerability

 

SQL Server (1 CVE)

Important severity
CVE-2024-0056

 

Microsoft.Data.SqlClient and System.Data.SqlClient SQL Data Provider Information Disclosure Vulnerability

 

Appendix D: Advisories and Other Products

This is a list of advisories and information on other relevant CVEs in the December Microsoft release, sorted by product.

Relevant to Edge / Chromium (4 CVEs)

CVE-2024-0222 Chromium: CVE-2024-0222 Use after free in ANGLE
CVE-2024-0223 Chromium: CVE-2024-0223 Heap buffer overflow in ANGLE
CVE-2024-0224 Chromium: CVE-2024-0224 Use after free in WebAudio
CVE-2024-0225 Chromium: CVE-2024-0225 Use after free in WebGPU

 

Relevant to Windows (third-party product) (one CVE)

CVE-2022-35737 MITRE: CVE-2022-35737 SQLite allows an array-bounds overflow

 

Latest articles

spot_imgspot_img

Related articles

Leave a reply

Please enter your comment!
Please enter your name here

spot_imgspot_img