The November 2024 Patch Tuesday adresses 91 vulnerabilities, including 4 zero-day ones

You should them updates as soon as possible.

Reading time icon 7 min. read


Readers help support Windows Report. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help Windows Report sustain the editorial team. Read more

Patch Tuesday November 2024

The November 2024 Patch Tuesday security updates have fixed 91 flaws, which include 4 zero-day vulnerabilities. As with most Patch Tuesday releases, November’s updates include fixes for Windows, Office, .NET, Visual Studio, SQL Server, and more vulnerabilities.

This month’s fixes list includes:

  • 26 elevations of privilege vulnerabilities
  • 2 security feature bypass vulnerabilities
  • 52 remote code execution vulnerabilities
  • 1 information disclosure vulnerability
  • 4 denial of service vulnerabilities
  • 3 spoofing vulnerabilities

Two of the zero-days fixed today are actively exploited in attacks, and the third was publicly disclosed but not exploited.

CVE-2024-43451 – NTLM Hash Disclosure Spoofing Vulnerability

This vulnerability discloses a user’s NTLMv2 hash to the attacker who could use this to authenticate as the user. Minimal interaction with a malicious file by a user such as selecting (single-click), inspecting (right-click), or performing an action other than opening or executing could trigger this vulnerability.

CVE-2024-49039 – Windows Task Scheduler Elevation of Privilege Vulnerability

In this case, a successful attack could be performed from a low privilege AppContainer. The attacker could elevate their privileges and execute code or access resources at a higher integrity level than that of the AppContainer execution environment.

CVE-2024-49040 – Microsoft Exchange Server Spoofing Vulnerability

Microsoft is aware of a vulnerability (CVE-2024-49040) that allows attackers to run spoofing attacks against Microsoft Exchange Server. The vulnerability is caused by the current implementation of the P2 FROM header verification, which happens in transport.

CVE-2024-49019 – Active Directory Certificate Services Elevation of Privilege Vulnerability

Check if you have published any certificates created using a version 1 certificate template where the Source of subject name is set to “Supplied in the request” and the Enroll permissions are granted to a broader set of accounts, such as domain users or domain computers. An example is the built-in Web Server template, but it is not vulnerable by default due to its restricted Enroll permissions.

Here’s the complete list of all the vulnerabilities Microsoft addresses with the November 2024 Patch Tuesday update.

TagCVE IDCVE TitleSeverity
.NET and Visual StudioCVE-2024-43499.NET and Visual Studio Denial of Service VulnerabilityImportant
.NET and Visual StudioCVE-2024-43498.NET and Visual Studio Remote Code Execution VulnerabilityCritical
Airlift.microsoft.comCVE-2024-49056Airlift.microsoft.com Elevation of Privilege VulnerabilityCritical
Azure CycleCloudCVE-2024-43602Azure CycleCloud Remote Code Execution VulnerabilityImportant
LightGBMCVE-2024-43598LightGBM Remote Code Execution VulnerabilityImportant
Microsoft Defender for EndpointCVE-2024-5535OpenSSL: CVE-2024-5535 SSL_select_next_proto buffer overreadImportant
Microsoft Edge (Chromium-based)CVE-2024-10826Chromium: CVE-2024-10826 Use after free in Family ExperiencesUnknown
Microsoft Edge (Chromium-based)CVE-2024-10827Chromium: CVE-2024-10827 Use after free in SerialUnknown
Microsoft Exchange ServerCVE-2024-49040Microsoft Exchange Server Spoofing VulnerabilityImportant
Microsoft Graphics ComponentCVE-2024-49031Microsoft Office Graphics Remote Code Execution VulnerabilityImportant
Microsoft Graphics ComponentCVE-2024-49032Microsoft Office Graphics Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2024-49029Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2024-49026Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2024-49027Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2024-49028Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office ExcelCVE-2024-49030Microsoft Excel Remote Code Execution VulnerabilityImportant
Microsoft Office SharePointADV240001Microsoft SharePoint Server Defense in Depth UpdateNone
Microsoft Office WordCVE-2024-49033Microsoft Word Security Feature Bypass VulnerabilityImportant
Microsoft PC ManagerCVE-2024-49051Microsoft PC Manager Elevation of Privilege VulnerabilityImportant
Microsoft Virtual Hard DriveCVE-2024-38264Microsoft Virtual Hard Disk (VHDX) Denial of Service VulnerabilityImportant
Microsoft Windows DNSCVE-2024-43450Windows DNS Spoofing VulnerabilityImportant
Role: Windows Active Directory Certificate ServicesCVE-2024-49019Active Directory Certificate Services Elevation of Privilege VulnerabilityImportant
Role: Windows Hyper-VCVE-2024-43633Windows Hyper-V Denial of Service VulnerabilityImportant
Role: Windows Hyper-VCVE-2024-43624Windows Hyper-V Shared Virtual Disk Elevation of Privilege VulnerabilityImportant
SQL ServerCVE-2024-48998SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-48997SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-48993SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49001SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49000SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-48999SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49043Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-43462SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-48995SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-48994SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-38255SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-48996SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-43459SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49002SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49013SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49014SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49011SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49012SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49015SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49018SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49021Microsoft SQL Server Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49016SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49017SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49010SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49005SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49007SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49003SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49004SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49006SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49009SQL Server Native Client Remote Code Execution VulnerabilityImportant
SQL ServerCVE-2024-49008SQL Server Native Client Remote Code Execution VulnerabilityImportant
TorchGeoCVE-2024-49048TorchGeo Remote Code Execution VulnerabilityImportant
Visual StudioCVE-2024-49044Visual Studio Elevation of Privilege VulnerabilityImportant
Visual Studio CodeCVE-2024-49050Visual Studio Code Python Extension Remote Code Execution VulnerabilityImportant
Visual Studio CodeCVE-2024-49049Visual Studio Code Remote Extension Elevation of Privilege VulnerabilityModerate
Windows CSC ServiceCVE-2024-43644Windows Client-Side Caching Elevation of Privilege VulnerabilityImportant
Windows Defender Application Control (WDAC)CVE-2024-43645Windows Defender Application Control (WDAC) Security Feature Bypass VulnerabilityImportant
Windows DWM Core LibraryCVE-2024-43636Win32k Elevation of Privilege VulnerabilityImportant
Windows DWM Core LibraryCVE-2024-43629Windows DWM Core Library Elevation of Privilege VulnerabilityImportant
Windows KerberosCVE-2024-43639Windows Kerberos Remote Code Execution VulnerabilityCritical
Windows KernelCVE-2024-43630Windows Kernel Elevation of Privilege VulnerabilityImportant
Windows NT OS KernelCVE-2024-43623Windows NT OS Kernel Elevation of Privilege VulnerabilityImportant
Windows NTLMCVE-2024-43451NTLM Hash Disclosure Spoofing VulnerabilityImportant
Windows Package Library ManagerCVE-2024-38203Windows Package Library Manager Information Disclosure VulnerabilityImportant
Windows RegistryCVE-2024-43641Windows Registry Elevation of Privilege VulnerabilityImportant
Windows RegistryCVE-2024-43452Windows Registry Elevation of Privilege VulnerabilityImportant
Windows Secure Kernel ModeCVE-2024-43631Windows Secure Kernel Mode Elevation of Privilege VulnerabilityImportant
Windows Secure Kernel ModeCVE-2024-43646Windows Secure Kernel Mode Elevation of Privilege VulnerabilityImportant
Windows Secure Kernel ModeCVE-2024-43640Windows Kernel-Mode Driver Elevation of Privilege VulnerabilityImportant
Windows SMBCVE-2024-43642Windows SMB Denial of Service VulnerabilityImportant
Windows SMBv3 Client/ServerCVE-2024-43447Windows SMBv3 Server Remote Code Execution VulnerabilityImportant
Windows Task SchedulerCVE-2024-49039Windows Task Scheduler Elevation of Privilege VulnerabilityImportant
Windows Telephony ServiceCVE-2024-43628Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2024-43621Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2024-43620Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2024-43627Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2024-43635Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2024-43622Windows Telephony Service Remote Code Execution VulnerabilityImportant
Windows Telephony ServiceCVE-2024-43626Windows Telephony Service Elevation of Privilege VulnerabilityImportant
Windows Update StackCVE-2024-43530Windows Update Stack Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2024-43643Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2024-43449Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2024-43637Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2024-43634Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows USB Video DriverCVE-2024-43638Windows USB Video Class System Driver Elevation of Privilege VulnerabilityImportant
Windows VMSwitchCVE-2024-43625Microsoft Windows VMSwitch Elevation of Privilege VulnerabilityCritical
Windows Win32 Kernel SubsystemCVE-2024-49046Windows Win32 Kernel Subsystem Elevation of Privilege VulnerabilityImportant

In addition to the above vulnerabilities, Microsoft has also fixed a bug in Windows that caused blue screens on Windows Server 2025 devices. The problem would occur during backups or deduplication jobs.

Furthermore, a new update for Microsoft Exchange Server 2025 adds a warning to emails that could be abusing the CVE-2024-49040 vulnerability.

Microsoft released the November 2024 Patch Tuesday updates for Windows 10 and Windows 11, managing to fix some frustrating issues on these operating systems.

Windows users can get the November 2024 Patch Tuesday updates via Windows Update, Microsoft Update, or downloading them from the Microsoft Update Catalog website.

More about the topics: patch tuesday, windows 10, Windows 11

User forum

0 messages