First published: Tue Sep 10 2024(Updated: )
Microsoft SQL Server Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | >=13.0.7000.253<13.0.7040.1 | |
Microsoft SQL Server 2016 (CU 17) | >=13.0.6300.2<13.0.6441.1 | |
Microsoft SQL Server | >=14.0.1000.169<14.0.2060.1 | |
Microsoft SQL Server | >=14.0.3006.16<14.0.3475.1 | |
Microsoft SQL Server | >=15.0.2000.5<15.0.2120.1 | |
Microsoft SQL Server | >=15.0.4003.23<15.0.4390.2 | |
Microsoft SQL Server | >=16.0.1000.6<16.0.1125.1 | |
Microsoft SQL Server | >=16.0.4003.1<16.0.4140.3 | |
Microsoft SQL Server | ||
Microsoft SQL Server 2016 (CU 17) | ||
Microsoft SQL Server | ||
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37341 is classified as an elevation of privilege vulnerability.
To fix CVE-2024-37341, apply the latest security updates and patches provided by Microsoft for the affected SQL Server versions.
CVE-2024-37341 affects Microsoft SQL Server 2016, 2017, 2019, and 2022 across various cumulative updates.
CVE-2024-37341 could allow an attacker to elevate their privileges on vulnerable SQL Server instances.
Yes, applying the relevant security updates as specified in the Microsoft guidance is required to mitigate CVE-2024-37341.