Skip to content

2024-056: Multiple Vulnerabilities in Microsoft Products

Table of Contents

On June 11, 2024, Microsoft addressed 58 vulnerabilities in its June 2024 Patch Tuesday update, including one zero-day vulnerability. This Patch Tuesday also fixes one critical vulnerability, a Microsoft Message Queuing (MSMQ) Remote Code Execution vulnerability.


Microsoft Patch Tuesday - June 2024

Microsoft Patch Tuesday - June 2024

Summary

On June 11, 2024, Microsoft released their Patch Tuesday update addressing a total of 58 vulnerabilities, including one zero-day vulnerability. The update also includes a critical fix for a Microsoft Message Queuing (MSMQ) remote code execution vulnerability.

Technical Details

The critical vulnerability, known as CVE-2024-30080, affects Microsoft Message Queuing (MSMQ) and has a CVSS score of 9.8. Exploiting this vulnerability allows an attacker to execute arbitrary code on an affected server, potentially gaining control of the system. This can be achieved by sending a specially crafted malicious MSMQ packet to the server.

Another vulnerability, identified as CVE-2023-50868 and rated with a CVSS score of 6.5, is a zero-day vulnerability in DNSSEC validation. This vulnerability allows an attacker to exploit standard DNSSEC protocols, causing a denial of service for legitimate users by overwhelming the resolver with excessive resources.

Affected Products

The vulnerabilities impact various Microsoft products, including but not limited to Microsoft Windows, Microsoft Server, Microsoft Office, and Microsoft SharePoint.

Recommendations

It is strongly recommended to apply the available updates to affected assets as soon as possible to protect against these vulnerabilities.

References


```htmlMITRE ATT&CK Matrix - Microsoft June 2024 Advisory Summary

MITRE ATT&CK Matrix - Microsoft June 2024 Advisory Summary

Enterprise Layer

Tactic Technique/Sub-Technique Potential Attacker Groups Mitigation
Initial Access T1190 - Exploit Public-Facing Application APT groups, Cybercriminals Update software (CVE-2024-30080)
Execution T1203 - Exploitation for Client Execution APT groups, Cybercriminals Update software (CVE-2024-30080)
Impact T1499 - Endpoint Denial of Service
- .004: Network Denial of Service
APT groups, Cybercriminals Update software (CVE-2023-50868)

Mobile Layer

No mobile-specific techniques were indicated in the advisory summary for the reported vulnerabilities.

ICS Layer

No ICS-specific techniques were indicated in the advisory summary for the reported vulnerabilities.

Mitigation Techniques References

For detailed mitigation guidelines, refer to the official Microsoft security bulletins [1].

```


This post was generated entirely by an AI language model. Source: CERT EU

Latest