First published: Tue Sep 10 2024(Updated: )
Microsoft SQL Server Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server | ||
Microsoft SQL Server 2016 T-SQL Language Service | ||
Microsoft SQL Server 2016 T-SQL Language Service | >=13.0.6300.2<13.0.6445.1 | |
Microsoft SQL Server 2016 T-SQL Language Service | >=13.0.7000.253<13.0.7040.1 | |
Microsoft SQL Server | >=14.0.1000.169<14.0.2060.1 | |
Microsoft SQL Server | >=14.0.3006.16<14.0.3475.1 | |
Microsoft SQL Server | >=15.0.2000.5<15.0.2120.1 | |
Microsoft SQL Server | >=15.0.4003.23<15.0.4390.2 | |
Microsoft SQL Server | >=16.0.1000.6<16.0.1125.1 | |
Microsoft SQL Server | >=16.0.4003.1<16.0.4140.3 | |
Microsoft SQL Server | ||
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37965 is classified as an Elevation of Privilege vulnerability in Microsoft SQL Server.
To fix CVE-2024-37965, apply the latest security patches provided by Microsoft for the affected versions of SQL Server.
CVE-2024-37965 affects Microsoft SQL Server 2016, 2017, 2019, and 2022 across several update levels.
Vulnerable versions include SQL Server 2016 SP3, SQL Server 2017 (CU 31), SQL Server 2019 (up to CU 28), and SQL Server 2022.
Exploiting CVE-2024-37965 could allow an attacker to gain elevated privileges, potentially compromising database security.