CrowdStrike Update Causes BSOD Issues Globally – Audit Available 🛡️ Learn more

TRY NOW
Patch Tuesday

Microsoft Patch Tuesday – June 2024

5 min. read
11/06/2024
By Esben Dochy
Microsoft Patch Tuesday

⚡ TL;DR | Go Straight to the June 202Patch Tuesday Audit Report

Patch Tuesday is once again upon us. As always, our team has put together the monthly Patch Tuesday Report to help you manage your update progress. The audit report gives you a quick and clear overview of your Windows machines and their patching status. The June 2024 edition of Patch Tuesday brings us 51 new fixes, with 1 rated as critical. We’ve listed the most important changes below.

Windows 10 21H2 Last Update

Windows 10 version 21H2 has reached its end-of-life. Today the Enterprise, Education and IoT Enterprise editions go end-of-life which were the last 21H2 supported version. According to our data 44.49% of Windows 10 devices will need to update before next month to remain supported.

Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

The only critical rated vulnerability this month is CVE-2024-30080, a RCE vulnerability with a CVSS base score of 9.8. Additionally, Microsoft lists that this vulnerability is more likely to be exploited so its best you update as soon as possible.

In order to exploit the vulnerability Microsoft shared the following:

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

Utilizing Lansweeper you can actually easily discover devices with the Windows message queuing service using our Windows Server MSMQ Server Feature Audit.

Multiple Elevation of Privilege Vulnerabilities

Aside from the one critical vulnerability, no other vulnerabilities really jump out. All the remaining vulnerabilities listed as being more likely to be exploited are EoP vulnerabilities in various Windows components.

All 10 vulnerabilities range between a CVSS base score of 7 and 7.8 and don’t really have much additional information aside from potential access attackers can gain from exploitation, but no information about how exploitation would occur.

Run the Patch Tuesday June 2024 Audit

To help manage your update progress, we’ve created the Patch Tuesday Audit that checks if the assets in your network are on the latest patch updates. The report has been color-coded to see which machines are up-to-date and which ones still need to be updated. As always, system administrators are urged to update their environment as soon as possible to ensure all endpoints are secured.

The Lansweeper Patch Tuesday report is automatically added to your Lansweeper Site. Lansweeper Sites is included in all our licenses without any additional cost and allows you to federate all your installations into one single view so all you need to do is look at one report, automatically added every patch Tuesday!

Patch Tuesday June 2024 CVE Codes & Titles

CVE NumberCVE Title
CVE-2024-30069Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-30070DHCP Server Service Denial of Service Vulnerability
CVE-2024-30072Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability
CVE-2024-30074Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
CVE-2024-30075Windows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
CVE-2024-30076Windows Container Manager Service Elevation of Privilege Vulnerability
CVE-2024-30077Windows OLE Remote Code Execution Vulnerability
CVE-2024-30078Windows Wi-Fi Driver Remote Code Execution Vulnerability
CVE-2024-35255Azure Identity Libraries and Microsoft Authentication Library Elevation of Privilege Vulnerability
CVE-2023-50868MITRE: CVE-2023-50868 NSEC3 closest encloser proof can exhaust CPU
CVE-2024-29187GitHub: CVE-2024-29187 WiX Burn-based bundles are vulnerable to binary hijack when run as SYSTEM
CVE-2024-29060Visual Studio Elevation of Privilege Vulnerability
CVE-2024-30062Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability
CVE-2024-30063Windows Distributed File System (DFS) Remote Code Execution Vulnerability
CVE-2024-30064Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-30065Windows Themes Denial of Service Vulnerability
CVE-2024-30066Winlogon Elevation of Privilege Vulnerability
CVE-2024-30067Winlogon Elevation of Privilege Vulnerability
CVE-2024-30068Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-30083Windows Standards-Based Storage Management Service Denial of Service Vulnerability
CVE-2024-30090Microsoft Streaming Service Elevation of Privilege Vulnerability
CVE-2024-30093Windows Storage Elevation of Privilege Vulnerability
CVE-2024-30094Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-30095Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-30096Windows Cryptographic Services Information Disclosure Vulnerability
CVE-2024-30097Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability
CVE-2024-30100Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-30101Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30102Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30103Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-30104Microsoft Office Remote Code Execution Vulnerability
CVE-2024-35248Microsoft Dynamics 365 Business Central Elevation of Privilege Vulnerability
CVE-2024-35249Microsoft Dynamics 365 Business Central Remote Code Execution Vulnerability
CVE-2024-35252Azure Storage Movement Client Library Denial of Service Vulnerability
CVE-2024-35253Microsoft Azure File Sync Elevation of Privilege Vulnerability
CVE-2024-35254Azure Monitor Agent Elevation of Privilege Vulnerability
CVE-2024-35263Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability
CVE-2024-35265Windows Perception Service Elevation of Privilege Vulnerability
CVE-2024-37325Azure Science Virtual Machine (DSVM) Elevation of Privilege Vulnerability
CVE-2024-30052Visual Studio Remote Code Execution Vulnerability
CVE-2024-30080Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-30082Win32k Elevation of Privilege Vulnerability
CVE-2024-35250Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-30084Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-30085Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2024-30086Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2024-30087Win32k Elevation of Privilege Vulnerability
CVE-2024-30088Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-30089Microsoft Streaming Service Elevation of Privilege Vulnerability
CVE-2024-30091Win32k Elevation of Privilege Vulnerability
CVE-2024-30099Windows Kernel Elevation of Privilege Vulnerability
NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.