{"id":57187,"date":"2024-08-15T15:11:48","date_gmt":"2024-08-15T14:11:48","guid":{"rendered":"https:\/\/www.n-able.com\/?p=57187"},"modified":"2024-10-29T11:46:45","modified_gmt":"2024-10-29T11:46:45","slug":"microsoft-patch-tuesday-august-2024","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024","title":{"rendered":"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks"},"content":{"rendered":"<p class=\"p2\"><span class=\"s1\">Downgrade Attacks, a bundle of zero-days, and multiple vulnerabilities under Active Exploitation will add to the sense of urgency for Patch Tuesday this August. There\u2019s lots to read-up on, so expect lots of links to extra reading. On top of Microsoft releasing fixes for an unusually high number of zero-days and vulnerabilities that are under Active Exploitation, there was also a demonstration of a new Downgrade Attack against Windows that was demonstrated at <a href=\"https:\/\/www.blackhat.com\/us-24\/briefings\/schedule\/index.html?_gl=1*1u1vva9*_gcl_au*MTQyMzk2OTMzNS4xNzIzNjYwMjgz#windows-downdate-downgrade-attacks-using-windows-updates-38963\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Black Hat 2024<\/span><\/a> and <a href=\"https:\/\/defcon.org\/html\/defcon-32\/dc-32-speakers.html?_gl=1*1u1vva9*_gcl_au*MTQyMzk2OTMzNS4xNzIzNjYwMjgz#54522\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Def Con 32<\/span><\/a>\u2014where an NTLM hash attack was also demonstrated.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Microsoft Vulnerabilities<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">There are six zero-day vulnerabilities that are under Active Exploitation and three that have been publicly disclosed but are not under active exploitation in the wild as of publication. There is also a fourth publicly disclosed vulnerability, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38202\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2024-38202<\/span><\/a> that while announced on August 7 has not yet received a published fix. The total number of vulnerabilities addressed this month is 89; this includes 9 rated as critical. If your teams prioritize based only on severity this month is a great a reminder that prioritizing which vulnerabilities to address based only on severity rating can leave an environment more exposed than you realize, the vulnerabilities under Active Exploitation are only rated as Important and Moderate.<\/span><\/p>\n<p class=\"p2\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38178\" target=\"_blank\" rel=\"noopener\">CVE-2024-38178<\/a><\/span><span class=\"s1\"> Scripting Engine Memory Corruption is a vulnerability of note for the fact it dredges up Internet Explorer, or rather Internet Explorer mode for Microsoft Edge. Only requiring a user to click a link makes this trivial to exploit if Microsoft Edge is in Internet Explorer mode. While most environments have moved beyond a need for Internet Explorer there are many line of business applications and tools in use by SMBs that still require the use of this compatibility mode. As this was reported by the <a href=\"https:\/\/www.ncsc.go.kr\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">National Cyber Security Center (NCSC), Republic of Korea<\/span><\/a> and <a href=\"https:\/\/www.ahnlab.com\/en\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">AhnLab<\/span><\/a>, it\u2019s likely this is under Active Exploitation by nation state backed threat actors. Count this as one more piece of evidence as to why clients need to update business processes that rely on outdated and vulnerable legacy technologies.<\/span><\/p>\n<p class=\"p2\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38199\" target=\"_blank\" rel=\"noopener\">CVE-2024-38199<\/a><\/span><span class=\"s1\"> Windows Line Printer Daemon (LPD) Service Remote Code Execution allows for an unauthenticated attacker to send a print task to a Windows Line Printer Daemon service and allow for remote code execution against the target system running the service. This publicly reported zero-day has not been detected in the wild as of publication. While LPD has been deprecated since Windows 2012 and is not enabled or installed by default, the chances of this being in your environment is low but you won\u2019t know unless you check.<\/span><\/p>\n<p class=\"p2\"><span class=\"s3\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38200\" target=\"_blank\" rel=\"noopener\">CVE-2024-38200<\/a><\/span><span class=\"s1\"> Microsoft Office Spoofing vulnerability is another in a long line of NTLM hash attacks that have surfaced this year. This vulnerability allows for exploitation via a link to an attacker-controlled website, upon clicking the attacker can record the NTLM hashes used during the authentication process. A Feature Flighting from July 30 this provided an alternative fix for this vulnerability in addition to <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-office-2016-august-13-2024-kb5002625-c3a98ccb-8c3c-4932-a70a-9c743bf470fa\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5002625<\/span><\/a> and <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/description-of-the-security-update-for-office-2016-august-13-2024-kb5002570-81979cea-b5ac-451d-84fb-3305c6050217\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5002570<\/span><\/a> for Office 2016, as well as click-to-run updates for modern versions of Microsoft Office. If you would like to force an update of Microsoft Office products that support click-to-run update you can leverage items available in the <a href=\"https:\/\/www.n-able.com\/automation-cookbook\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Automation Cookbook<\/span><\/a>:<\/span><\/p>\n<ul>\n<li class=\"p4\"><span class=\"s4\"><a href=\"https:\/\/me.n-able.com\/s\/article\/Microsoft-365-Update-With-Version-Check-N&#8209;sight\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>Download<\/b><\/span><\/a><\/span><span class=\"s1\"><b> the Microsoft 365 Update With Version Check for N&#8209;sight<\/b><\/span><\/li>\n<li class=\"p5\"><span class=\"s4\"><a href=\"https:\/\/me.n-able.com\/s\/article\/Microsoft-365-Update-With-Version-Check-NC\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>Download<\/b><\/span><\/a><\/span><span class=\"s1\"><b> the Microsoft 365 Update With Version Check<\/b> <b>for N&#8209;central<\/b><\/span><\/li>\n<\/ul>\n<h2 class=\"p3\"><span class=\"s1\">Windows OS-based Downgrade Attack<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">First demonstrated at Black Hat 2024 and Def Con 32, <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-21302\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2024-21302<\/span><\/a> Windows Secure Kernel Mode Elevation of Privilege and <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38202\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2024-38202<\/span><\/a> are two of the zero-day vulnerabilities that exist in Windows systems that were leveraged by security researcher <a href=\"https:\/\/x.com\/_0xdeku\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">Alon Leviev<\/span><\/a> with <a href=\"https:\/\/www.safebreach.com\/\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">SafeBreach<\/span><\/a> in their proof of concept for a Downgrade Attack with a tool named Windows Downdate. This Downgrade Attack allows for \u201cWindows Update process to craft fully undetectable, invisible, persistent, and irreversible downgrades on critical OS components\u201d. This can then place systems into an un-patched state against past vulnerabilities, making them susceptible to attacks leveraging old vulnerabilities.<\/span><\/p>\n<p class=\"p2\"><span class=\"s5\"><b>Please read the research by Alon Leviev <\/b><a href=\"https:\/\/www.safebreach.com\/blog\/downgrade-attacks-using-windows-updates\" target=\"_blank\" rel=\"noopener\"><span class=\"s3\"><b>here<\/b><\/span><\/a><b> for more details on the Windows Downdate tool and a demo of the attack.<\/b><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">Per Microsoft, \u201cMicrosoft is developing a security update that will revoke outdated, unpatched VBS system files to mitigate this vulnerability, but it is not yet available. Due to the complexity of blocking such a large quantity of files, rigorous testing is required to avoid integration failures or regressions.\u201d<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">While we await additional fixes from Microsoft they have provided recommended actions for an opt-in mitigation available at <a href=\"https:\/\/support.microsoft.com\/en-us\/topic\/kb5042562-guidance-for-blocking-rollback-of-virtualization-based-security-vbs-related-security-updates-b2e7ebf4-f64d-4884-a390-38d63171b8d3\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">KB5042562: Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates<\/span><\/a> for CVE-2024-21302. For <a href=\"https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2024-38202\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\">CVE-2024-38202<\/span><\/a> there are recommended actions for reducing the risk of exploitation but no mitigation instructions pending a future security update.<\/span><\/p>\n<h2 class=\"p2\"><span class=\"s1\"><b>Microsoft Patch Tuesday Vulnerability Prioritization<\/b><\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">Addressing vulnerabilities effectively requires a mix of adhering to established best practices and leveraging informed judgment. While it\u2019s a natural instinct to rank vulnerabilities with critical severity ratings higher on the list of things that need to be addressed, relying on severity ratings alone can be limiting. An often-overlooked component is temporal metrics, which provide a measure of the window of vulnerability\u2014the time from initial vulnerability discovery to the availability and application of the patch. This is essential as the longer a vulnerability exists without a fix, the greater the potential for exploitation. By integrating temporal metrics into the risk evaluation process, organizations can gain a more comprehensive understanding of the threat landscape and potential attack vectors, ensuring that they don\u2019t leave themselves open to unnecessary risks.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><i>Table Key:\u00a0Severity:\u00a0C = Critical, I = Important, M = Moderate, R = Re-issue;\u00a0Status: EML = Exploitation More Likely, ELL = Exploitation Less Likely, ED = Exploitation Detected,\u00a0EU = Exploitation Unlikely, N\/A = Not Available<\/i><\/span><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\" class=\"t1\">\n<tbody>\n<tr>\n<td valign=\"top\" class=\"td1\" width=\"20%\">\n<p class=\"p6\"><span class=\"s1\"><b>CVE Number<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td2\" width=\"60%\">\n<p class=\"p6\"><span class=\"s1\"><b>CVE Title<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td3\" width=\"10%\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\"><b>Severity<\/b><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td4\" width=\"10%\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\"><b>Status<\/b><\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38189\" target=\"_blank\" rel=\"noopener\">CVE-2024-38189<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Microsoft Project Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38107\" target=\"_blank\" rel=\"noopener\">CVE-2024-38107<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Power Dependency Coordinator Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38106\" target=\"_blank\" rel=\"noopener\">CVE-2024-38106<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38213\" target=\"_blank\" rel=\"noopener\">CVE-2024-38213<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Mark of the Web Security Feature Bypass Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">M<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38193\" target=\"_blank\" rel=\"noopener\">CVE-2024-38193<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38178\" target=\"_blank\" rel=\"noopener\">CVE-2024-38178<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Scripting Engine Memory Corruption Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ED<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38109\" target=\"_blank\" rel=\"noopener\">CVE-2024-38109<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Azure Health Bot Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2022-3775\" target=\"_blank\" rel=\"noopener\">CVE-2022-3775<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Redhat: CVE-2022-3775 grub2 &#8211; Heap based out-of-bounds write when rendering certain Unicode sequences<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38143\" target=\"_blank\" rel=\"noopener\">CVE-2024-38143<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38140\" target=\"_blank\" rel=\"noopener\">CVE-2024-38140<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Reliable Multicast Transport Driver (RMCAST) Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-40547\" target=\"_blank\" rel=\"noopener\">CVE-2023-40547<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Redhat: CVE-2023-40547 Shim &#8211; RCE in HTTP boot support may lead to secure boot bypass<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38160\" target=\"_blank\" rel=\"noopener\">CVE-2024-38160<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Network Virtualization Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38159\" target=\"_blank\" rel=\"noopener\">CVE-2024-38159<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Network Virtualization Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">ELL<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38150\" target=\"_blank\" rel=\"noopener\">CVE-2024-38150<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows DWM Core Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38148\" target=\"_blank\" rel=\"noopener\">CVE-2024-38148<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Secure Channel Denial of Service Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38147\" target=\"_blank\" rel=\"noopener\">CVE-2024-38147<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Microsoft DWM Core Library Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38144\" target=\"_blank\" rel=\"noopener\">CVE-2024-38144<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38141\" target=\"_blank\" rel=\"noopener\">CVE-2024-38141<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38133\" target=\"_blank\" rel=\"noopener\">CVE-2024-38133<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Kernel Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38125\" target=\"_blank\" rel=\"noopener\">CVE-2024-38125<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38063\" target=\"_blank\" rel=\"noopener\">CVE-2024-38063<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows TCP\/IP Remote Code Execution Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">C<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td5\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38198\" target=\"_blank\" rel=\"noopener\">CVE-2024-38198<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td6\">\n<p class=\"p6\"><span class=\"s1\">Windows Print Spooler Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td7\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td8\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" class=\"td9\">\n<p class=\"p7\"><span class=\"s5\"><a href=\"https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2024-38196\" target=\"_blank\" rel=\"noopener\">CVE-2024-38196<span class=\"s6\"><\/span><\/a><\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td10\">\n<p class=\"p6\"><span class=\"s1\">Windows Common Log File System Driver Elevation of Privilege Vulnerability<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td11\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">I<\/span><\/p>\n<\/td>\n<td valign=\"top\" class=\"td12\">\n<p class=\"p6\" style=\"text-align: center;\"><span class=\"s1\">EML<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 class=\"p2\"><span class=\"s1\">Summary<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">As always make sure you have established patching processes for evaluation, testing and pushing into production. If you have traditionally only dealt with patches by applying them based on their severity consider including prioritization of patches for Zero-Days, Exploitation Detected and Exploitation More Likely vulnerabilities in your\u00a0Patch Management\u00a0routines.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><b>Looking for more blogs on patching, or looking for previous Microsoft Patch Tuesday Reviews, then check out\u00a0the\u00a0<\/b><a href=\"https:\/\/www.n-able.com\/blog\/patch-management\" target=\"_blank\" rel=\"noopener\"><span class=\"s2\"><b>Patch Management section of our blog<\/b><\/span><\/a><b>.<\/b><\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><i>Lewis Pope is the Head Security Nerd at N\u2011able. You can follow him on Twitter:\u00a0<\/i><a href=\"https:\/\/twitter.com\/cybersec_nerd\"><span class=\"s2\"><i>@cybersec_nerd<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p8\"><span class=\"s7\"><i>LinkedIn:\u00a0<\/i><a href=\"https:\/\/www.linkedin.com\/in\/thesecuritypope\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>thesecuritypope<\/i><\/span><\/a><\/span><\/p>\n<p class=\"p8\"><span class=\"s7\"><i>Twitch:\u00a0<\/i><a href=\"https:\/\/www.twitch.tv\/cybersec_nerd\" target=\"_blank\" rel=\"noopener\"><span class=\"s5\"><i>cybersec_nerd<\/i><\/span><\/a><i>\u00a0<\/i><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With a raft of new threats and vulnerabilities, August looks like being a challenging month for those running patching programs. Lewis Pope has the low-down.<\/p>\n","protected":false},"author":62,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-57187","post","type-post","status-publish","format-standard","hentry","topic-head-nerds","topic-patch-management","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks - N-able<\/title>\n<meta name=\"description\" content=\"With a raft of new threats and vulnerabilities in August&#039;s Microsoft Patch Tuesday, this could be a challenging month for patch admins.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks - N-able\" \/>\n<meta property=\"og:description\" content=\"With a raft of new threats and vulnerabilities in August&#039;s Microsoft Patch Tuesday, this could be a challenging month for patch admins.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-15T14:11:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-29T11:46:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2500\" \/>\n\t<meta property=\"og:image:height\" content=\"1309\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Lewis Pope\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lewis Pope\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024\"},\"author\":{\"name\":\"Lewis Pope\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\"},\"headline\":\"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks\",\"datePublished\":\"2024-08-15T15:11:48+01:00\",\"dateModified\":\"2024-10-29T11:46:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024\"},\"wordCount\":1342,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"articleSection\":[\"Head Nerds\",\"Patch Management\",\"Security\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024\",\"url\":\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024\",\"name\":\"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/de#website\"},\"datePublished\":\"2024-08-15T15:11:48+01:00\",\"dateModified\":\"2024-10-29T11:46:45+00:00\",\"description\":\"With a raft of new threats and vulnerabilities in August's Microsoft Patch Tuesday, this could be a challenging month for patch admins.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Head Nerds\",\"item\":\"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/de#website\",\"url\":\"https:\/\/www.n-able.com\/de\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/de#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae\",\"name\":\"Lewis Pope\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g\",\"caption\":\"Lewis Pope\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks - N-able","description":"With a raft of new threats and vulnerabilities in August's Microsoft Patch Tuesday, this could be a challenging month for patch admins.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024","og_locale":"de_DE","og_type":"article","og_title":"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks - N-able","og_description":"With a raft of new threats and vulnerabilities in August's Microsoft Patch Tuesday, this could be a challenging month for patch admins.","og_url":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-08-15T14:11:48+00:00","article_modified_time":"2024-10-29T11:46:45+00:00","og_image":[{"width":2500,"height":1309,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2022\/08\/220809_blogbanner_PatchTuesday_ss-03.png","type":"image\/png"}],"author":"Lewis Pope","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"Verfasst von":"Lewis Pope","Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024"},"author":{"name":"Lewis Pope","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae"},"headline":"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks","datePublished":"2024-08-15T15:11:48+01:00","dateModified":"2024-10-29T11:46:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024"},"wordCount":1342,"publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"articleSection":["Head Nerds","Patch Management","Security"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024","url":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024","name":"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/de#website"},"datePublished":"2024-08-15T15:11:48+01:00","dateModified":"2024-10-29T11:46:45+00:00","description":"With a raft of new threats and vulnerabilities in August's Microsoft Patch Tuesday, this could be a challenging month for patch admins.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/de\/blog\/microsoft-patch-tuesday-august-2024#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Head Nerds","item":"https:\/\/www.n-able.com\/de\/blog\/category\/head-nerds-de"},{"@type":"ListItem","position":2,"name":"Patch Tuesday August 2024: 6 Zero-Day Vulnerabilities Under Active Exploitation, and Windows Downgrade Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/de#website","url":"https:\/\/www.n-able.com\/de","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/de#organization","name":"N-able","url":"https:\/\/www.n-able.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/de#\/schema\/person\/32c214c92846fdd7b16459b9236c12ae","name":"Lewis Pope","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f61d746b384dec3b7d702cd5a5e62b2d6a9722dd83df5ae50505361c3a3eadb1?s=96&d=mm&r=g","caption":"Lewis Pope"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/57187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/users\/62"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/comments?post=57187"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/posts\/57187\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/de\/wp-json\/wp\/v2\/media?parent=57187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}