Microsoft SQL Server Elevation of Privilege Vulnerability
Released: Sep 10, 2024
Last updated: Oct 8, 2024
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2024-37341
- Impact
- Elevation of Privilege
- Max Severity
- Important
- Weakness
- CVSS Source
- Microsoft
- Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 8.8 / 7.7Base score metrics: 8.8 / Temporal score metrics: 7.7
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
FAQ
Where can I find more information about the known functional issues that occur in the Change Data Capture (CDC) feature and that were introduced in the September 2024 GDR?
The known functional issues are addressed by the October 2024 GDR updates listed in the Security Updates table. For more information about the known issue, including workarounds, refer to the following links for the September GDR Knowledge Base articles, based on the SQL Server version you have installed:
- KB5042578 - Description of the security update for SQL Server 2022 CU14: September 10, 2024
- KB5042211 - Description of the security update for SQL Server 2022 GDR: September 10, 2024
- KB5042749 - Description of the security update for SQL Server 2019 CU28: September 10, 2024
- KB5042214 - Description of the security update for SQL Server 2019 GDR: September 10, 2024
- KB5042215 - Description of the security update for SQL Server 2017 CU31: September 10, 2024
- KB5042217 - Description of the security update for SQL Server 2017 GDR: September 10, 2024
- KB5042209 - Description of the security update for SQL Server 2016 SP3 Azure Connect Feature Pack: September 10, 2024
- KB5042207 - Description of the security update for SQL Server 2016 SP3 GDR: September 10, 2024
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker who successfully exploited this vulnerability could gain administrator privileges.
I am running SQL Server on my system. What action do I need to take?
Update your relevant version of SQL Server. Any applicable driver fixes are included in those updates.
I am running my own application on my system. What action do I need to take?
Update your application to use Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed on this page, which provide protection against this vulnerability.
I am running an application from a software vendor on my system. What action do I need to take?
Consult with your application vendor if it is compatible with Microsoft OLE DB Driver 18 or 19. Update the drivers to the versions listed in this page, which provide protection against this vulnerability
There are GDR and/or CU (Cumulative Update) updates offered for my version of SQL Server. How do I know which update to use?
- First, determine your SQL Server version number. For more information on determining your SQL Server version number, see Microsoft Knowledge Base Article 321185 - How to determine the version, edition, and update level of SQL Server and its components.
- Second, in the table below, locate your version number or the version range that your version number falls within. The corresponding update is the one you need to install.
Note If your SQL Server version number is not represented in the table below, your SQL Server version is no longer supported. Please upgrade to the latest Service Pack or SQL Server product in order to apply this and future security updates.
Update Number | Title | Apply if current product version is… | This security update also includes servicing releases up through… |
---|---|---|---|
5046059 | Security update for SQL Server 2022 CU15+GDR | 16.0.4003.1 - 16.0.4145.4 | KB 5041321 - SQL2022 RTM CU15 |
5046057 | Security update for SQL Server 2022 RTM+GDR | 16.0.1000.6 - 16.0.1125.1 | KB 5042211 - SQL2022 RTM GDR |
5046060 | Security update for SQL Server 2019 CU28+GDR | 15.0.4003.23 - 15.0.4390.2 | KB 5042749 - SQL2019 RTM CU28 GDR |
5046056 | Security update for SQL Server 2019 RTM+GDR | 15.0.2000.5 - 15.0.2120.1 | KB 5042214 - SQL2019 RTM GDR |
5046061 | Security update for SQL Server 2017 CU31+GDR | 14.0.3006.16 - 14.0.3475.1 | KB 5040940 - SQL2017 RTM CU31 |
5046058 | Security update for SQL Server 2017 RTM+GDR | 14.0.1000.169 - 14.0.2060.1 | KB 5042217 - SQL2017 RTM GDR |
5046062 | Security update for SQL 2016 Azure Connect Feature Pack | 13.0.7000.253 - 13.0.7040.1 | KB 5042209 - SQL2016 Azure Connect Feature Pack GDR |
5046063 | Security update for SQL Server 2016 SP3 RTM+GDR | 13.0.6300.2 - 13.0.6445.1 | KB 5042207 - SQL2016 RTM GDR |
What are the GDR and CU update designations and how do they differ?
The General Distribution Release (GDR) and Cumulative Update (CU) designations correspond to the two different servicing options in place for SQL Server baseline releases. A baseline can be either an RTM release or a Service Pack release.
- GDR updates – cumulatively only contain security updates for the given baseline.
- CU updates – cumulatively contain all functional fixes and security updates for the given baseline.
For any given baseline, either the GDR or CU updates could be options (see below).
- If SQL Server installation is at a baseline version, you can choose either the GDR or CU update.
- If SQL Server installation has intentionally only installed past GDR updates, then choose to install the GDR update package.
- If SQL Server installation has intentionally installed previous CU updates, then chose to install the CU security update package.
Note: You are allowed to make a change from GDR updates to CU updates ONE TIME. Once a SQL Server CU update is applied to a SQL Server installation, there is NO way to go back to the GDR update path.
Can the security updates be applied to SQL Server instances on Windows Azure (IaaS)?
Yes. SQL Server instances on Windows Azure (IaaS) can be offered the security updates through Microsoft Update, or customers can download the security updates from Microsoft Download Center and apply them manually.
Acknowledgements
- Anonymous
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- 16.0.4150.1
- 15.0.4395.2
- 16.0.1130.5
- 14.0.3480.1
- 13.0.7045.2
- 13.0.6450.1
- 15.0.2125.1
- 14.0.2065.1
Disclaimer
Revisions
To address known functional issues that occur in the Change Data Capture (CDC) feature that were introduced in the September 2024 GDR, Microsoft has released updated GDR for the following versions of SQL Server: SQL Server 2016, SQL Server 2017, SQL Server 2019, and SQL Server 2022. For more information see the FAQ section of CVE-2024-37341.
Information published.