{"id":3928,"date":"2024-10-08T13:56:41","date_gmt":"2024-10-08T18:56:41","guid":{"rendered":"https:\/\/cert.pa\/?p=3928"},"modified":"2024-10-08T13:56:43","modified_gmt":"2024-10-08T18:56:43","slug":"csirt-panama-aviso-2024-oct-8-actualizaciones-de-seguridad-de-microsoft-para-octubre-2024","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=3928","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2024-oct-8 Actualizaciones de seguridad de Microsoft para Octubre 2024."},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2024-oct-8 Actualizaciones de seguridad de Microsoft para Octubre 2024.<br>Gravedad: Alta<br>Fecha de publicaci\u00f3n: octubre 8, 2024<br>\u00daltima revisi\u00f3n: octubre 8, 2024<br>https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Oct<\/p>\n\n\n\n<p>Sistemas Afectados:<br>Role: Windows Hyper-V<br>Windows Hyper-V<br>Windows EFI Partition<br>Windows Kernel<br>OpenSSH for Windows<br>Azure Monitor<br>Windows Netlogon<br>Windows Kerberos<br>BranchCache<br>Azure Stack<br>Windows Routing and Remote Access Service (RRAS)<br>.NET and Visual Studio<br>Windows Remote Desktop Licensing Service<br>Windows Remote Desktop Services<br>Microsoft Configuration Manager<br>Service Fabric<br>Power BI<br>.NET, .NET Framework, Visual Studio<br>Visual Studio Code<br>DeepSpeed<br>Windows Resilient File System (ReFS)<br>Windows Common Log File System Driver<br>Microsoft Office SharePoint<br>Microsoft Office Excel<br>Microsoft Office Visio<br>Microsoft Graphics Component<br>Windows Standards-Based Storage Management Service<br>Windows BitLocker<br>Windows NTFS<br>Internet Small Computer Systems Interface (iSCSI)<br>Windows Secure Kernel Mode<br>Microsoft ActiveX<br>Windows Telephony Server<br>Microsoft WDAC OLE DB provider for SQL<br>Windows Local Security Authority (LSA)<br>Windows Mobile Broadband<br>Windows Print Spooler Components<br>RPC Endpoint Mapper Service<br>Remote Desktop Client<br>Windows Kernel-Mode Drivers<br>Microsoft Simple Certificate Enrollment Protocol<br>Windows Online Certificate Status Protocol (OCSP)<br>Windows Cryptographic Services<br>Windows Secure Channel<br>Windows Storage<br>Windows Shell<br>Windows NT OS Kernel<br>Windows Storage Port Driver<br>Windows Network Address Translation (NAT)<br>Windows Ancillary Function Driver for WinSock<br>Sudo for Windows<br>Microsoft Management Console<br>Windows MSHTML Platform<br>Microsoft Windows Speech<br>Microsoft Office<br>Windows Remote Desktop<br>Winlogon<br>Windows Scripting<br>Code Integrity Guard<br>Visual C++ Redistributable Installer<br>Azure CLI<br>Visual Studio<br>Outlook for Android<br>Microsoft Defender for Endpoint<\/p>\n\n\n\n<p>I. Descripci\u00f3n<br>Microsoft ha liberado sus actualizaciones de seguridad correspondientes al mes de octubre de 2024.<br>Este conjunto de actualizaciones remedia 118 fallas y 5 dia cero.<\/p>\n\n\n\n<p>II. Detalle<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>Tag<\/th><th>CVE ID<\/th><th>CVE Title<\/th><th>Severity<\/th><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38229\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38229<\/a><\/td><td>.NET and Visual Studio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET and Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43485\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43485<\/a><\/td><td>.NET and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET, .NET Framework, Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43484\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43484<\/a><\/td><td>.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>.NET, .NET Framework, Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43483\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43483<\/a><\/td><td>.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure CLI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43591\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43591<\/a><\/td><td>Azure Command Line Integration (CLI) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Monitor<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38097\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38097<\/a><\/td><td>Azure Monitor Agent Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Azure Stack<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38179\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38179<\/a><\/td><td>Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>BranchCache<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43506\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43506<\/a><\/td><td>BranchCache Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>BranchCache<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38149\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38149<\/a><\/td><td>BranchCache Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Code Integrity Guard<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43585\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43585<\/a><\/td><td>Code Integrity Guard Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>DeepSpeed<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43497\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43497<\/a><\/td><td>DeepSpeed Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Internet Small Computer Systems Interface (iSCSI)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43515\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43515<\/a><\/td><td>Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft ActiveX<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43517\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43517<\/a><\/td><td>Microsoft ActiveX Data Objects Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Configuration Manager<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43468\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43468<\/a><\/td><td>Microsoft Configuration Manager Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Microsoft Defender for Endpoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43614\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43614<\/a><\/td><td>Microsoft Defender for Endpoint for Linux Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-9369\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-9369<\/a><\/td><td>Chromium: CVE-2024-9369 Insufficient data validation in Mojo<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-9370\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-9370<\/a><\/td><td>Chromium: CVE-2024-9370 Inappropriate implementation in V8<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Edge (Chromium-based)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-7025\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-7025<\/a><\/td><td>Chromium: CVE-2024-7025 Integer overflow in Layout<\/td><td>Unknown<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43534\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43534<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43508\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43508<\/a><\/td><td>Windows Graphics Component Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43556\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43556<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Graphics Component<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43509\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43509<\/a><\/td><td>Windows Graphics Component Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Management Console<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43572\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43572<\/a><\/td><td>Microsoft Management Console Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43616\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43616<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43576\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43576<\/a><\/td><td>Microsoft Office Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43609\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43609<\/a><\/td><td>Microsoft Office Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Excel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43504\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43504<\/a><\/td><td>Microsoft Excel Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office SharePoint<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43503\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43503<\/a><\/td><td>Microsoft SharePoint Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Office Visio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43505\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43505<\/a><\/td><td>Microsoft Office Visio Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Simple Certificate Enrollment Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43544\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43544<\/a><\/td><td>Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Simple Certificate Enrollment Protocol<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43541\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43541<\/a><\/td><td>Microsoft Simple Certificate Enrollment Protocol Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft WDAC OLE DB provider for SQL<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43519\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43519<\/a><\/td><td>Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Microsoft Windows Speech<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43574\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43574<\/a><\/td><td>Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>OpenSSH for Windows<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43615\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43615<\/a><\/td><td>Microsoft OpenSSH for Windows Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>OpenSSH for Windows<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43581\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43581<\/a><\/td><td>Microsoft OpenSSH for Windows Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>OpenSSH for Windows<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38029\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38029<\/a><\/td><td>Microsoft OpenSSH for Windows Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Outlook for Android<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43604\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43604<\/a><\/td><td>Outlook for Android Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Power BI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43612\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43612<\/a><\/td><td>Power BI Report Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Power BI<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43481\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43481<\/a><\/td><td>Power BI Report Server Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43533\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43533<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Remote Desktop Client<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43599\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43599<\/a><\/td><td>Remote Desktop Client Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43521\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43521<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-20659\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-20659<\/a><\/td><td>Windows Hyper-V Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43567\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43567<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Role: Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43575\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43575<\/a><\/td><td>Windows Hyper-V Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>RPC Endpoint Mapper Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43532\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43532<\/a><\/td><td>Remote Registry Service Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Service Fabric<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43480\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43480<\/a><\/td><td>Azure Service Fabric for Linux Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Sudo for Windows<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43571\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43571<\/a><\/td><td>Sudo for Windows Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual C++ Redistributable Installer<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43590\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43590<\/a><\/td><td>Visual C++ Redistributable Installer Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43603\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43603<\/a><\/td><td>Visual Studio Collector Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43488\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43488<\/a><\/td><td>Visual Studio Code extension for Arduino Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Visual Studio Code<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43601\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43601<\/a><\/td><td>Visual Studio Code for Linux Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Ancillary Function Driver for WinSock<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43563\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43563<\/a><\/td><td>Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows BitLocker<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43513\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43513<\/a><\/td><td>BitLocker Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Common Log File System Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43501\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43501<\/a><\/td><td>Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Cryptographic Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43546\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43546<\/a><\/td><td>Windows Cryptographic Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows cURL Implementation<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-6197\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-6197<\/a><\/td><td>Open Source Curl Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows EFI Partition<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37982\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37982<\/a><\/td><td>Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows EFI Partition<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37976\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37976<\/a><\/td><td>Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows EFI Partition<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37983\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37983<\/a><\/td><td>Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Hyper-V<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-30092\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-30092<\/a><\/td><td>Windows Hyper-V Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43547\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43547<\/a><\/td><td>Windows Kerberos Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kerberos<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38129\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38129<\/a><\/td><td>Windows Kerberos Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43502\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43502<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43511\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43511<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43520\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43520<\/a><\/td><td>Windows Kernel Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43527\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43527<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43570\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43570<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-37979\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-37979<\/a><\/td><td>Windows Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel-Mode Drivers<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43554\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43554<\/a><\/td><td>Windows Kernel-Mode Driver Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Kernel-Mode Drivers<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43535\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43535<\/a><\/td><td>Windows Kernel-Mode Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Local Security Authority (LSA)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43522\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43522<\/a><\/td><td>Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43555\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43555<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43540\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43540<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43536\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43536<\/a><\/td><td>Windows Mobile Broadband Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43538\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43538<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43525\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43525<\/a><\/td><td>Windows Mobile Broadband Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43559\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43559<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43561\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43561<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43558\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43558<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43542\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43542<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43557\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43557<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43526\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43526<\/a><\/td><td>Windows Mobile Broadband Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43543\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43543<\/a><\/td><td>Windows Mobile Broadband Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43523\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43523<\/a><\/td><td>Windows Mobile Broadband Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43524\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43524<\/a><\/td><td>Windows Mobile Broadband Driver Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Mobile Broadband<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43537\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43537<\/a><\/td><td>Windows Mobile Broadband Driver Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows MSHTML Platform<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43573\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43573<\/a><\/td><td>Windows MSHTML Platform Spoofing Vulnerability<\/td><td>Moderate<\/td><\/tr><tr><td>Windows Netlogon<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38124\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38124<\/a><\/td><td>Windows Netlogon Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Network Address Translation (NAT)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43562\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43562<\/a><\/td><td>Windows Network Address Translation (NAT) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Network Address Translation (NAT)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43565\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43565<\/a><\/td><td>Windows Network Address Translation (NAT) Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NT OS Kernel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43553\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43553<\/a><\/td><td>NT OS Kernel Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows NTFS<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43514\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43514<\/a><\/td><td>Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Online Certificate Status Protocol (OCSP)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43545\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43545<\/a><\/td><td>Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Print Spooler Components<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43529\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43529<\/a><\/td><td>Windows Print Spooler Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43582\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43582<\/a><\/td><td>Remote Desktop Protocol Server Remote Code Execution Vulnerability<\/td><td>Critical<\/td><\/tr><tr><td>Windows Remote Desktop Licensing Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38262\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38262<\/a><\/td><td>Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Remote Desktop Services<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43456\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43456<\/a><\/td><td>Windows Remote Desktop Services Tampering Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Resilient File System (ReFS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43500\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43500<\/a><\/td><td>Windows Resilient File System (ReFS) Information Disclosure Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43592\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43592<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43589\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43589<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38212\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38212<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43593\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43593<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38261\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38261<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43611\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43611<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43453\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43453<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38265\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-38265<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43607\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43607<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43549\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43549<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43608\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43608<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Routing and Remote Access Service (RRAS)<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43564\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43564<\/a><\/td><td>Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Scripting<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43584\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43584<\/a><\/td><td>Windows Scripting Engine Security Feature Bypass Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Channel<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43550\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43550<\/a><\/td><td>Windows Secure Channel Spoofing Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43516\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43516<\/a><\/td><td>Windows Secure Kernel Mode Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Secure Kernel Mode<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43528\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43528<\/a><\/td><td>Windows Secure Kernel Mode Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Shell<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43552\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43552<\/a><\/td><td>Windows Shell Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Standards-Based Storage Management Service<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43512\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43512<\/a><\/td><td>Windows Standards-Based Storage Management Service Denial of Service Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43551\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43551<\/a><\/td><td>Windows Storage Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Storage Port Driver<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43560\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43560<\/a><\/td><td>Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Windows Telephony Server<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43518\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43518<\/a><\/td><td>Windows Telephony Server Remote Code Execution Vulnerability<\/td><td>Important<\/td><\/tr><tr><td>Winlogon<\/td><td><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-43583\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2024-43583<\/a><\/td><td>Winlogon Elevation of Privilege Vulnerability<\/td><td>Important<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>III. Referencia a soluciones, herramientas e informaci\u00f3n<br>Actualizar utilizando Microsoft Windows Update o herramientas de administracion de actualizaciones centralizadas.<\/p>\n\n\n\n<p>IV. Informaci\u00f3n de contacto<br>CSIRT PANAMA<br>Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br>E-Mail: info@cert.pa<br>Phone: +507 520-CERT (2378)<br>Web: https:\/\/cert.pa<br>Twitter: @CSIRTPanama<br>Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2024-oct-8 Actualizaciones de seguridad de Microsoft para Octubre 2024.Gravedad: AltaFecha de publicaci\u00f3n: octubre 8, 2024\u00daltima revisi\u00f3n: octubre 8, 2024https:\/\/msrc.microsoft.com\/update-guide\/releaseNote\/2024-Oct Sistemas Afectados:Role: Windows Hyper-VWindows Hyper-VWindows EFI PartitionWindows KernelOpenSSH for WindowsAzure MonitorWindows NetlogonWindows KerberosBranchCacheAzure&#8230;<\/p>\n","protected":false},"author":5,"featured_media":1847,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[76,43,8,72,9,73,80,68,45,94],"class_list":["post-3928","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-actualizaciones","tag-alertas","tag-avisos","tag-avisos-de-seguridad","tag-microsoft","tag-parches","tag-vulnerabilidad","tag-vulnerabilidades","tag-windows","tag-windows-update"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3928"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3928\/revisions"}],"predecessor-version":[{"id":3929,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/3928\/revisions\/3929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1847"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}