First published: Tue Sep 10 2024(Updated: )
Microsoft SQL Server Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2019 for Linux Containers | ||
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2022 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server | ||
Microsoft SQL Server | ||
Microsoft SQL Server 2016 (CU 17) | ||
Microsoft SQL Server 2016 (CU 17) | >=13.0.6300.2<13.0.6445.1 | |
Microsoft SQL Server 2016 (CU 17) | >=13.0.7000.253<13.0.7040.1 | |
Microsoft SQL Server | >=14.0.1000.169<14.0.2060.1 | |
Microsoft SQL Server | >=14.0.3006.16<14.0.3475.1 | |
Microsoft SQL Server | >=15.0.2000.5<15.0.2120.1 | |
Microsoft SQL Server | >=15.0.4003.23<15.0.4390.2 | |
Microsoft SQL Server | >=16.0.1000.6<16.0.1125.1 | |
Microsoft SQL Server | >=16.0.4003.1<16.0.4140.3 | |
Microsoft SQL Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37980 has been categorized as an elevation of privilege vulnerability, which can allow attackers to gain elevated access to system resources.
To fix CVE-2024-37980, update your SQL Server instances to the latest patches provided by Microsoft.
CVE-2024-37980 affects Microsoft SQL Server versions 2016, 2017, 2019, and 2022 across multiple configurations.
CVE-2024-37980 can potentially be exploited by attackers to execute unauthorized operations on the affected SQL Server instances.
As of now, there have been no public reports of active exploits targeting CVE-2024-37980, but it's advisable to apply patches promptly.