Microsoft has announced the security updates for August 2024.
August 2024 Security Updates
This release consists of the following 90 Microsoft CVEs:
Tag CVE Base Score Exploitability FAQs? Workarounds? Mitigations? Windows Secure Kernel Mode CVE-2024-21302 6.7 Exploitation Less Likely Yes No No Windows Kerberos CVE-2024-29995 8.1 Exploitation Less Likely Yes No No Microsoft Windows DNS CVE-2024-37968 7.5 Exploitation Less Likely No No No Windows TCP/IP CVE-2024-38063 9.8 Exploitation More Likely Yes No Yes Microsoft Office CVE-2024-38084 7.8 Exploitation Less Likely Yes No No Azure Connected Machine Agent CVE-2024-38098 7.8 Exploitation Unlikely Yes No No Windows Kernel CVE-2024-38106 7.0 Exploitation Detected Yes No No Windows Power Dependency Coordinator CVE-2024-38107 7.8 Exploitation Detected Yes No No Azure Stack CVE-2024-38108 9.3 Exploitation Less Likely Yes No No Azure Health Bot CVE-2024-38109 9.1 Exploitation Less Likely Yes No No Windows IP Routing Management Snapin CVE-2024-38114 8.8 Exploitation Less Likely Yes No No Windows IP Routing Management Snapin CVE-2024-38115 8.8 Exploitation Less Likely Yes No No Windows IP Routing Management Snapin CVE-2024-38116 8.8 Exploitation Less Likely Yes No No Windows NTFS CVE-2024-38117 7.8 Exploitation Less Likely Yes No No Microsoft Local Security Authority Server (lsasrv) CVE-2024-38118 5.5 Exploitation Less Likely Yes No No Windows Routing and Remote Access Service (RRAS) CVE-2024-38120 8.8 Exploitation Less Likely Yes No No Windows Routing and Remote Access Service (RRAS) CVE-2024-38121 8.8 Exploitation Less Likely Yes No No Microsoft Local Security Authority Server (lsasrv) CVE-2024-38122 5.5 Exploitation Less Likely Yes No No Microsoft Bluetooth Driver CVE-2024-38123 4.4 Exploitation Less Likely Yes No No Microsoft Streaming Service CVE-2024-38125 7.8 Exploitation More Likely Yes No No Windows Network Address Translation (NAT) CVE-2024-38126 7.5 Exploitation Less Likely Yes No No Windows Kernel CVE-2024-38127 7.8 Exploitation Less Likely Yes No No Windows Routing and Remote Access Service (RRAS) CVE-2024-38128 8.8 Exploitation Less Likely Yes No No Windows Routing and Remote Access Service (RRAS) CVE-2024-38130 8.8 Exploitation Less Likely Yes No No Windows Clipboard Virtual Channel Extension CVE-2024-38131 8.8 Exploitation Less Likely Yes No No Windows Network Address Translation (NAT) CVE-2024-38132 7.5 Exploitation Less Likely Yes No No Windows Kernel CVE-2024-38133 7.8 Exploitation More Likely Yes No No Microsoft Streaming Service CVE-2024-38134 7.8 Exploitation Less Likely Yes No No Windows NT OS Kernel CVE-2024-38135 7.8 Exploitation Less Likely Yes No No Windows Resource Manager CVE-2024-38136 7.0 Exploitation Less Likely Yes No No Windows Resource Manager CVE-2024-38137 7.0 Exploitation Less Likely Yes No No Windows Deployment Services CVE-2024-38138 7.5 Exploitation Less Likely Yes No No Reliable Multicast Transport Driver (RMCAST) CVE-2024-38140 9.8 Exploitation Less Likely Yes No Yes Windows Ancillary Function Driver for WinSock CVE-2024-38141 7.8 Exploitation More Likely Yes No No Windows Secure Kernel Mode CVE-2024-38142 7.8 Exploitation Less Likely Yes No No Windows WLAN Auto Config Service CVE-2024-38143 4.2 Exploitation Less Likely Yes No No Microsoft Streaming Service CVE-2024-38144 8.8 Exploitation More Likely Yes No No Windows Layer-2 Bridge Network Driver CVE-2024-38145 7.5 Exploitation Less Likely Yes No No Windows Layer-2 Bridge Network Driver CVE-2024-38146 7.5 Exploitation Less Likely Yes No No Windows DWM Core Library CVE-2024-38147 7.8 Exploitation More Likely Yes No No Windows Transport Security Layer (TLS) CVE-2024-38148 7.5 Exploitation More Likely Yes No No Windows DWM Core Library CVE-2024-38150 7.8 Exploitation More Likely Yes No No Windows Kernel CVE-2024-38151 5.5 Exploitation Less Likely Yes No No Microsoft WDAC OLE DB provider for SQL CVE-2024-38152 7.8 Exploitation Less Likely Yes No No Windows Kernel CVE-2024-38153 7.8 Exploitation Less Likely Yes No No Windows Routing and Remote Access Service (RRAS) CVE-2024-38154 8.8 Exploitation Less Likely Yes No No Windows Security Center CVE-2024-38155 5.5 Exploitation Less Likely Yes No No Azure IoT SDK CVE-2024-38157 7.0 Exploitation Less Likely Yes No No Azure IoT SDK CVE-2024-38158 7.0 Exploitation Less Likely Yes No No Windows Network Virtualization CVE-2024-38159 9.1 Exploitation Less Likely Yes No Yes Windows Network Virtualization CVE-2024-38160 9.1 Exploitation Less Likely Yes No Yes Windows Mobile Broadband CVE-2024-38161 6.8 Exploitation Less Likely Yes No No Azure Connected Machine Agent CVE-2024-38162 7.8 Exploitation Less Likely Yes No No Windows Update Stack CVE-2024-38163 7.8 Exploitation More Likely Yes No No Windows Compressed Folder CVE-2024-38165 6.5 Exploitation Less Likely Yes No No Microsoft Dynamics CVE-2024-38166 8.2 Exploitation Less Likely Yes No No .NET and Visual Studio CVE-2024-38167 6.5 Exploitation Less Likely Yes No No .NET and Visual Studio CVE-2024-38168 7.5 Exploitation Less Likely No No No Microsoft Office Visio CVE-2024-38169 7.8 Exploitation Less Likely Yes No No Microsoft Office Excel CVE-2024-38170 7.1 Exploitation Less Likely Yes No No Microsoft Office PowerPoint CVE-2024-38171 7.8 Exploitation Less Likely Yes No No Microsoft Office Excel CVE-2024-38172 7.8 Exploitation Less Likely Yes No No Microsoft Office Outlook CVE-2024-38173 6.7 Exploitation Less Likely Yes No No Windows App Installer CVE-2024-38177 7.8 Exploitation Less Likely Yes No No Windows Scripting CVE-2024-38178 7.5 Exploitation Detected Yes No No Windows SmartScreen CVE-2024-38180 8.8 Exploitation Less Likely Yes No No Windows Kernel-Mode Drivers CVE-2024-38184 7.8 Exploitation Less Likely Yes No No Windows Kernel-Mode Drivers CVE-2024-38185 7.8 Exploitation Less Likely Yes No No Windows Kernel-Mode Drivers CVE-2024-38186 7.8 Exploitation Less Likely Yes No No Windows Kernel-Mode Drivers CVE-2024-38187 7.8 Exploitation Less Likely Yes No No Microsoft Office Project CVE-2024-38189 8.8 Exploitation Detected Yes No Yes Windows Kernel-Mode Drivers CVE-2024-38191 7.8 Exploitation Less Likely Yes No No Windows Ancillary Function Driver for WinSock CVE-2024-38193 7.8 Exploitation Detected Yes No No Azure CycleCloud CVE-2024-38195 7.8 Exploitation Less Likely Yes No No Windows Common Log File System Driver CVE-2024-38196 7.8 Exploitation More Likely Yes No No Microsoft Teams CVE-2024-38197 6.5 Exploitation Less Likely Yes No No Windows Print Spooler Components CVE-2024-38198 7.5 Exploitation More Likely Yes No No Line Printer Daemon Service (LPD) CVE-2024-38199 9.8 Exploitation Less Likely Yes No Yes Microsoft Office CVE-2024-38200 6.5 Exploitation Less Likely Yes No Yes Azure Stack CVE-2024-38201 7.0 Exploitation Less Likely Yes No No Windows Update Stack CVE-2024-38202 7.3 Exploitation Less Likely Yes No No Microsoft Copilot Studio CVE-2024-38206 8.5 Exploitation Less Likely Yes No No Microsoft Dynamics CVE-2024-38211 8.2 Exploitation Less Likely Yes No No Windows Mark of the Web (MOTW) CVE-2024-38213 6.5 Exploitation Detected Yes No No Windows Routing and Remote Access Service (RRAS) CVE-2024-38214 6.5 Exploitation Less Likely Yes No No Windows Cloud Files Mini Filter Driver CVE-2024-38215 7.8 Exploitation Less Likely Yes No No Microsoft Edge (Chromium-based) CVE-2024-38218 8.4 Exploitation Less Likely Yes No No Microsoft Edge (Chromium-based) CVE-2024-38219 6.5 Exploitation Less Likely Yes No No Microsoft Edge (Chromium-based) CVE-2024-38222 Exploitation Less Likely Yes No No Windows Initial Machine Configuration CVE-2024-38223 6.8 Exploitation Less Likely Yes No No We are republishing 12 non-Microsoft CVEs:
CNA Tag CVE FAQs? Workarounds? Mitigations? Red Hat, Inc. Windows Secure Boot CVE-2022-2601 Yes No No Red Hat, Inc. Windows Secure Boot CVE-2022-3775 Yes No No Red Hat, Inc. Windows Secure Boot CVE-2023-40547 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-6990 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-7255 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-7256 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-7532 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-7533 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-7534 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-7535 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-7536 Yes No No Chrome Microsoft Edge (Chromium-based) CVE-2024-7550 Yes No No Security Update Guide Blog Posts
Date Blog Post June 27, 2024 Toward greater transparency: Unveiling Cloud Service CVEs April 9, 2024 Toward greater transparency: Security Update Guide now shares CWEs for CVEs January 6, 2023 Publishing CBL-Mariner CVEs on the Security Update Guide CVRF API January 11, 2022 Coming Soon: New Security Update Guide Notification System February 9, 2021 Continuing to Listen: Good News about the Security Update Guide API January 13, 2021 Security Update Guide Supports CVEs Assigned by Industry Partners December 8, 2020 Security Update Guide: Let’s keep the conversation going November 9, 2020 Vulnerability Descriptions in the New Version of the Security Update Guide Relevant Resources
- The new Hotpatching feature is now generally available. Please see Hotpatching feature for Windows Server Azure Edition virtual machines (VMs) for more information.
- Windows 10 and Windows 11 updates are cumulative. The monthly security release includes all security fixes for vulnerabilities that affect Windows 10 and Windows 11, in addition to non-security updates. The updates are available via the Microsoft Update Catalog. For information on lifecycle and support dates for Windows 10 and Windows 11 operating systems, please see Windows Lifecycle Facts Sheet.
- Microsoft is improving Windows Release Notes. For more information, please see What's next for Windows release notes.
- A list of the latest servicing stack updates for each operating system can be found in ADV990001. This list will be updated whenever a new servicing stack update is released. It is important to install the latest servicing stack update.
- In addition to security changes for the vulnerabilities, updates include defense-in-depth updates to help improve security-related features.
- Customers running Windows Server 2008 R2, or Windows Server 2008 need to purchase the Extended Security Update to continue receiving security updates. See 4522133 for more information.
Known Issues
You can see these in more detail from the Deployments tab by selecting Known Issues column in the Edit Columns panel.
For more information about Windows Known Issues, please see Windows message center (links to currently-supported versions of Windows are in the left pane).
KB Article Applies To 5041160 Windows Server 2022 5041571 Windows 11 version 24H2 5041578 Windows 10, version 1809, Windows Server 2019 5041580 Windows 10, version 21H2, Windows 10, version 22H2 5041592 Windows 11, version 21H2 5041773 Windows 10, version 1607, Windows Server 2016 5041828 Windows Server 2012 R2 (Monthly Rollup) 5041847 Windows Server 2008 (Security-only update) 5041850 Windows Server 2008 (Monthly Rollup) 5041851 Windows Server 2012 (Monthly Rollup)