First published: Tue Jul 09 2024(Updated: )
Secure Boot Security Feature Bypass Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =23H2 | |
Windows 11 | =23H2 | |
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.10240.20710 | |
Microsoft Windows 10 | <10.0.14393.7159 | |
Microsoft Windows 10 | <10.0.17763.6054 | |
Microsoft Windows 10 | <10.0.19044.4651 | |
Microsoft Windows 10 | <10.0.19045.4651 | |
Windows 11 | <10.0.22000.3079 | |
Windows 11 | <10.0.22621.3880 | |
Windows 11 | <10.0.22631.3880 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | <10.0.14393.7159 | |
Microsoft Windows Server 2019 | <10.0.17763.6054 | |
Microsoft Windows Server 2022 | <10.0.20348.2582 | |
Microsoft Windows Server 2022 | <=10.0.25398.1009 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | ||
Windows 10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37989 is classified as a security feature bypass vulnerability which can potentially allow unauthorized modifications.
To fix CVE-2024-37989, apply the latest security patches from Microsoft that address this vulnerability.
CVE-2024-37989 affects multiple Microsoft products including Windows Server 2022, Windows 10 versions 1809, 21H2, 22H2, and Windows 11 versions 21H2, 22H2, and 23H2.
The details about exploitation methods for CVE-2024-37989 indicate that it may require local access to the system.
It is recommended to immediately update affected systems with the security patches provided by Microsoft and monitor for any unusual activities.