KB5043083: Windows 10 LTS 1507 Security Update (September 2024)

critical Nessus Plugin ID 206908

Synopsis

The remote Windows host is affected by multiple vulnerabilities.

Description

The remote Windows host is missing security update 5043083. It is, therefore, affected by multiple vulnerabilities

- Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability. This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order.
Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions are still under support. (CVE-2024-43491)

- Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43461)

- Windows Remote Access Connection Manager Elevation of Privilege Vulnerability (CVE-2024-38240)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Apply Security Update 5043083

See Also

https://support.microsoft.com/help/5043083

Plugin Details

Severity: Critical

ID: 206908

File Name: smb_nt_ms24_sep_5043083.nasl

Version: 1.7

Type: local

Agent: windows

Published: 9/10/2024

Updated: 10/11/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Critical

Score: 9.0

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-43491

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:microsoft:windows_10_1507

Required KB Items: SMB/MS_Bulletin_Checks/Possible

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/10/2024

Vulnerability Publication Date: 9/10/2024

CISA Known Exploited Vulnerability Due Dates: 10/1/2024, 10/7/2024

Reference Information

CVE: CVE-2024-30073, CVE-2024-38014, CVE-2024-38046, CVE-2024-38119, CVE-2024-38217, CVE-2024-38234, CVE-2024-38235, CVE-2024-38237, CVE-2024-38238, CVE-2024-38239, CVE-2024-38240, CVE-2024-38241, CVE-2024-38242, CVE-2024-38243, CVE-2024-38244, CVE-2024-38245, CVE-2024-38247, CVE-2024-38249, CVE-2024-38250, CVE-2024-38254, CVE-2024-38256, CVE-2024-43461, CVE-2024-43487, CVE-2024-43491

IAVA: 2024-A-0575-S, 2024-A-0576-S

MSFT: MS24-5043083

MSKB: 5043083