Service Notices

All Notices > Security Notices > Microsoft Releases June 2024 Security Updates

Microsoft Releases June 2024 Security Updates

Jun 13, 2024 GMT+08:00

I. Overview

Microsoft has released its June 2024 Security Updates. A total of 49 security vulnerabilities have been disclosed, among which 1 are marked as an important vulnerability. Attackers can exploit these vulnerabilities to implement remote code execution, privilege escalation, and denial of service (DoS). The affected applications include components such as Microsoft Windows, Microsoft Office, Azure and Visual Studio.

For details, visit the Microsoft official website:

https://msrc.microsoft.com/update-guide/releaseNote/2024-Jun

The following vulnerabilities require close scrutiny as their details have been disclosed or they have already been exploited by attackers:

11 vulnerabilities (such as CVE-2024-30080, CVE-2024-30082, and CVE-2024-35250) are marked as Exploitation More Likely. For details, see the official announcement. Please perform security self-check and security hardening in a timely manner to reduce attack risks.

II. Severity

Severity: important

(Severity: low, moderate, important, and critical)

III. Affected Products

Microsoft Windows, Microsoft Office, Azure, Visual Studio, and other products.

IV. Vulnerability Details

CVE No.

Vulnerability

Severity

Description

CVE-2024-30080

Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

Important

To exploit this vulnerability, an attacker would need to send a specially crafted malicious MSMQ packet to a MSMQ server. This could result in remote code execution on the server side.

(Note: Vulnerabilities listed above are important ones. For more information, refer to the official website of Microsoft.)

V. Security Recommendations

1. Use Windows Update or download patches from the following address to fix the vulnerabilities:

https://msrc.microsoft.com/update-guide

2. Back up data remotely to protect your data.

Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.