9.8
CVSSv3

CVE-2024-38076

CVSSv4: NA | CVSSv3: 9.8 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.00053 | KEV: Not Included
Published: 09/07/2024 Updated: 21/11/2024

Vulnerability Summary

Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2019

microsoft windows server 2019 (server core installation)

microsoft windows server 2022

microsoft windows server 2022, 23h2 edition (server core installation)

microsoft windows server 2016

microsoft windows server 2016 (server core installation)

microsoft windows server 23h2

microsoft windows server 2022 23h2

Recent Articles

Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days
BleepingComputer • Lawrence Abrams • 09 Jul 2024

Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days By Lawrence Abrams July 9, 2024 01:52 PM 0 .crit { font-weight:bold; color:red; } .article_section td { font-size: 14px!important; } Today is Microsoft's July 2024 Patch Tuesday, which includes security updates for 142 flaws, including two actively exploited and two publicly disclosed zero-days. This Patch Tuesday fixed five critical vulnerabilities, with all being remote code execution flaws. The number of bugs in each vulnerability...

Critical Windows licensing bugs, plus two others under attack, top Patch Tuesday
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources Citrix, SAP also deserve your attention – because miscreants are already thinking about Exploit Wednesday

Patch Tuesday Clear your Microsoft system administrator's diary: The bundle of fixes in Redmond's July Patch Tuesday is a doozy, with at least two bugs under active exploitation. Tuesday's software updates address 139 Microsoft CVEs. The first of two vulnerabilities for sure under active exploit – CVE-2024-38080 – is a Windows Hyper-V elevation of privilege flaw with a 7.8-out-of-10 CVSS rating, which Microsoft deemed "important." We don't know how widespread exploitation is of this one, tho...