Application Type | CVE | Severity | Impact | Possible Mitigations | Vendor Link |
---|---|---|---|---|---|
Microsoft Operating System | CVE-2024-38074 | Critical (CVSS 9.8) | Remote code execution in Windows Remote Desktop Licensing Service | Apply official patch; disable the service if not needed; monitor for suspicious activities | Microsoft Advisory |
CVE-2024-38076 | Critical (CVSS 9.8) | Remote code execution in Windows Remote Desktop Licensing Service | Apply official patch; disable the service if not needed; monitor for suspicious activities | Microsoft Advisory | |
CVE-2024-38077 | Critical (CVSS 9.8) | Remote code execution in Windows Remote Desktop Licensing Service | Apply official patch; disable the service if not needed; monitor for suspicious activities | Microsoft Advisory | |
CVE-2024-38060 | Critical (CVSS 8.8) | Remote code execution in Windows Imaging Component | Apply official patch; restrict access to vulnerable systems; monitor for suspicious file uploads | Microsoft Advisory | |
CVE-2024-38080 | Important (CVSS 7.8) | Privilege escalation in Windows Hyper-V (Zero-day, actively exploited) | Apply the official patch immediately; monitor for suspicious activities; ensure systems are up-to-date | Microsoft Advisory | |
CVE-2024-38112 | Important (CVSS 7.5) | Spoofing vulnerability in Windows MSHTML Platform (Zero-day, actively exploited) | Apply the official patch immediately; educate users about the risks of executing unknown files | Microsoft Advisory | |
CVE-2024-38073 | Important (CVSS 7.5) | Denial of Service in Windows Remote Desktop Licensing Service | Apply official patch; monitor for unusual network traffic | Microsoft Advisory | |
CVE-2024-38015 | Important (CVSS 7.5) | Denial of Service in Windows Remote Desktop Gateway | Apply official patch; implement network segmentation | Microsoft Advisory | |
CVE-2024-30098 | Important (CVSS 7.5) | Security Feature Bypass in Windows Cryptographic Services | Apply official patch; review and update cryptographic configurations | Microsoft Advisory | |
CVE-2024-38061 | Important (CVSS 7.5) | Elevation of Privilege in DCOM Remote Cross-Session Activation | Apply official patch; restrict DCOM access | Microsoft Advisory | |
Server Application | CVE-2024-38023 | Critical (CVSS 7.2) | Remote code execution in Microsoft SharePoint Server | Apply security updates; restrict “Site Owner” permissions; monitor for suspicious activities | Microsoft Advisory |
CVE-2024-38087 | Critical (CVSS 8.8) | Remote code execution in SQL Server Native Client OLE DB Provider | Apply security updates; restrict access to SQL Server; monitor for unusual database activities | Microsoft Advisory | |
CVE-2024-38088 | Critical (CVSS 8.8) | Remote code execution in SQL Server Native Client OLE DB Provider | Apply security updates; restrict access to SQL Server; monitor for unusual database activities | Microsoft Advisory | |
CVE-2024-38044 | Important (CVSS 7.2) | Remote code execution in DHCP Server Service | Apply official patch; review DHCP server configurations | Microsoft Advisory | |
Development Tools | CVE-2024-35264 | Important (CVSS 8.1) | Remote code execution in .NET and Visual Studio | Apply the official patch; monitor and restrict access to vulnerable systems | Microsoft Advisory |
Office Applications | CVE-2024-38021 | Critical (CVSS 8.8) | Remote code execution in Microsoft Office | Apply security updates; ensure users are cautious about clicking on links from untrusted sources | Microsoft Advisory |
Network Services | CVE-2024-38031 | Important (CVSS 7.5) | Denial of Service in Windows Online Certificate Status Protocol (OCSP) Server | Apply official patch; implement OCSP stapling if possible | Microsoft Advisory |
CVE-2024-38067 | Important (CVSS 7.5) | Denial of Service in Windows Online Certificate Status Protocol (OCSP) Server | Apply official patch; implement OCSP stapling if possible | Microsoft Advisory | |
CVE-2024-38068 | Important (CVSS 7.5) | Denial of Service in Windows Online Certificate Status Protocol (OCSP) Server | Apply official patch; implement OCSP stapling if possible | Microsoft Advisory | |
CVE-2024-38091 | Important (CVSS 7.5) | Denial of Service in Microsoft WS-Discovery | Apply official patch; disable WS-Discovery if not needed | Microsoft Advisory | |
CVE-2024-3596 | Important (CVSS 7.5) | Spoofing vulnerability in RADIUS Protocol | Apply official patch; implement additional authentication mechanisms | Microsoft Advisory | |
System Components | CVE-2024-38033 | Important (CVSS 7.3) | Elevation of Privilege in PowerShell | Apply official patch; restrict PowerShell execution policies | Microsoft Advisory |
CVE-2024-38025 | Important (CVSS 7.2) | Remote code execution in Windows Performance Data Helper Library | Apply official patch; monitor for unusual system performance queries | Microsoft Advisory | |
CVE-2024-30081 | Important (CVSS 7.1) | Spoofing vulnerability in Windows NTLM | Apply official patch; consider disabling NTLM where possible | Microsoft Advisory | |
CVE-2024-38065 | Important (CVSS 6.8) | Security Feature Bypass in Secure Boot | Apply official patch; ensure physical security of systems | Microsoft Advisory |
These vulnerabilities should be addressed promptly to minimize
Citations:
[1] https://www.crowdstrike.com/blog/patch-tuesday-analysis-july-2024/
[2] https://www.ivanti.com/blog/july-2024-patch-tuesday
[3] https://www.tenable.com/blog/microsofts-july-2024-patch-tuesday-addresses-138-cves-cve-2024-38080-cve-2024-38112
[4] https://www.tenable.com/blog/oracle-july-2024-critical-patch-update-addresses-175-cves