CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.1%
The remote Windows host is missing security update 5043083. It is, therefore, affected by multiple vulnerabilities
Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability. This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order.
Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions are still under support. (CVE-2024-43491)
Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43461)
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability (CVE-2024-38240)
Note that Nessus has not tested for these issues but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 80900
##
# (C) Tenable, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from the Microsoft Security Updates API. The text
# itself is copyright (C) Microsoft Corporation.
##
include('compat.inc');
if (description)
{
script_id(206908);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/09/17");
script_cve_id(
"CVE-2024-30073",
"CVE-2024-38014",
"CVE-2024-38046",
"CVE-2024-38119",
"CVE-2024-38217",
"CVE-2024-38234",
"CVE-2024-38235",
"CVE-2024-38237",
"CVE-2024-38238",
"CVE-2024-38239",
"CVE-2024-38240",
"CVE-2024-38241",
"CVE-2024-38242",
"CVE-2024-38243",
"CVE-2024-38244",
"CVE-2024-38245",
"CVE-2024-38247",
"CVE-2024-38249",
"CVE-2024-38250",
"CVE-2024-38254",
"CVE-2024-38256",
"CVE-2024-43461",
"CVE-2024-43487",
"CVE-2024-43491"
);
script_xref(name:"MSKB", value:"5043083");
script_xref(name:"MSFT", value:"MS24-5043083");
script_xref(name:"IAVA", value:"2024-A-0575");
script_xref(name:"IAVA", value:"2024-A-0576");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/10/07");
script_xref(name:"CISA-KNOWN-EXPLOITED", value:"2024/10/01");
script_name(english:"KB5043083: Windows 10 LTS 1507 Security Update (September 2024)");
script_set_attribute(attribute:"synopsis", value:
"The remote Windows host is affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"The remote Windows host is missing security update 5043083. It is, therefore, affected by multiple vulnerabilities
- Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some
vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July
2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10,
version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have
installed the Windows security update released on March 12, 2024KB5035858 (OS Build 10240.20526) or other
updates released until August 2024. All later versions of Windows 10 are not impacted by this
vulnerability. This servicing stack vulnerability is addressed by installing the September 2024 Servicing
stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order.
Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the
Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only Windows 10 Enterprise 2015 LTSB and
Windows 10 IoT Enterprise 2015 LTSB editions are still under support. (CVE-2024-43491)
- Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43461)
- Windows Remote Access Connection Manager Elevation of Privilege Vulnerability (CVE-2024-38240)
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://support.microsoft.com/help/5043083");
script_set_attribute(attribute:"solution", value:
"Apply Security Update 5043083");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2024-43491");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2024/09/10");
script_set_attribute(attribute:"patch_publication_date", value:"2024/09/10");
script_set_attribute(attribute:"plugin_publication_date", value:"2024/09/10");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"cpe:/o:microsoft:windows_10_1507");
script_set_attribute(attribute:"stig_severity", value:"I");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Windows : Microsoft Bulletins");
script_copyright(english:"This script is Copyright (C) 2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("smb_check_rollup.nasl", "smb_hotfixes.nasl", "ms_bulletin_checks_possible.nasl");
script_require_keys("SMB/MS_Bulletin_Checks/Possible");
script_require_ports(139, 445, "Host/patch_management_checks");
exit(0);
}
include('smb_func.inc');
include('smb_hotfixes.inc');
include('smb_hotfixes_fcheck.inc');
include('smb_reg_query.inc');
get_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');
bulletin = 'MS24-09';
kbs = make_list(
'5043083'
);
if (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);
get_kb_item_or_exit('SMB/Registry/Enumerated');
get_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);
if (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);
share = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);
if (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);
if (
smb_check_rollup(os:'10',
os_build:10240,
rollup_date:'09_2024',
bulletin:bulletin,
rollup_kb_list:[5043083])
)
{
replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);
hotfix_security_hole();
hotfix_check_fversion_end();
exit(0);
}
else
{
hotfix_check_fversion_end();
audit(AUDIT_HOST_NOT, hotfix_get_audit_report());
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38014
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38046
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38119
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38217
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38234
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38235
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38237
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38238
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38239
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38240
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38241
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38242
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38243
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38244
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38245
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38247
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38249
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38250
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38254
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38256
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43461
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43487
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43491
support.microsoft.com/help/5043083
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
96.1%