First published: Tue Sep 10 2024(Updated: )
Microsoft SQL Server Native Scoring Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | >=13.0.7000.253<=13.0.7037.1 | |
Microsoft SQL Server 2016 (CU 17) | >=13.0.6300.2<13.0.6441.1 | |
Microsoft SQL Server | >=14.0.1000.169<14.0.2060.1 | |
Microsoft SQL Server | >=14.0.3006.16<14.0.3475.1 | |
Microsoft SQL Server | >=15.0.2000.5<15.0.2120.1 | |
Microsoft SQL Server | >=15.0.4003.23<15.0.4390.2 | |
Microsoft SQL Server | >=16.0.1000.6<16.0.1125.1 | |
Microsoft SQL Server | >=16.0.4003.1<16.0.4140.3 | |
Microsoft SQL Server | ||
Microsoft SQL Server | ||
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37340 has been classified with a high severity rating due to its potential for remote code execution.
To fix CVE-2024-37340, apply the recommended patches provided by Microsoft for the affected SQL Server versions.
CVE-2024-37340 affects Microsoft SQL Server 2016, 2017, 2019, and 2022 across various updates and configurations.
CVE-2024-37340 introduces remote code execution vulnerabilities which could allow an attacker to execute arbitrary code on the affected system.
While the best mitigation is applying patches, limiting network access to the SQL Server instances can reduce exposure to CVE-2024-37340.