Microsoft Monthly Security Update – 15 May 2024

In Cyber Security by Matsco Engineering Team


Microsoft have released a security advisory on the 15th of May 2024 in line with their regular monthly patch schedule which includes a number of updates to address one (1) Extremely High Risk, one (1) High Risk, five (5) Medium Risk and two (2) Low Risk product vulnerabilities. 

These updates address vulnerabilities which may impact services through Denial of Service, Elevation of Privilege, Remote Code Execution, Security Restriction Bypass, Information Disclosure Data Manipulation, and Spoofing. 

For more information please see: Microsoft Security Update

This release consists of security updates for the following products, features and roles:

  • Windows Task Scheduler
  • Microsoft Windows SCSI Class System File
  • Windows Common Log File System Driver
  • Windows Mobile Broadband
  • Microsoft WDAC OLE DB provider for SQL
  • Microsoft Brokering File System
  • Windows DWM Core Library
  • Windows Routing and Remote Access Service (RRAS)
  • Windows Hyper-V
  • Windows Cryptographic Services
  • Windows Kernel
  • Windows DHCP Server
  • Windows NTFS
  • Windows Win32K - ICOMP
  • Windows Win32K - GRFX
  • Windows CNG Key Isolation Service
  • Microsoft Windows Search Component
  • Windows Cloud Files Mini Filter Driver
  • Windows Deployment Services
  • Windows Remote Access Connection Manager
  • Windows MSHTML Platform
  • Microsoft Bing
  • Microsoft Office Excel
  • Microsoft Office SharePoint
  • .NET and Visual Studio
  • Visual Studio
  • Microsoft Dynamics 365 Customer Insights
  • Windows Mark of the Web (MOTW)
  • Azure Migrate
  • Power BI
  • Microsoft Edge (Chromium-based)
  • Microsoft Intune


CVE-2024-30040 is being exploited in the wild. This vulnerability bypasses OLE mitigations in Microsoft 365 and Microsoft Office which protect users from vulnerable COM/OLE controls.

CVE-2024-30051 is being exploited in the wild. An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.  

CVE-2024-4761 is being exploited in the wild. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger out-of-bounds write and execute arbitrary code on the target system.

Matsco recommends any affected systems are updated as soon as convenient 

Please contact the Matsco Solutions team on the below if you would like any further information or would like to schedule a maintenance.

Beijing  +86 400 120 2782
Hong Kong  +852 8101 8418
London   +44 (0)20 7821 4950
New York  +1 866 446 9226
Singapore  +65 6100 1090

Share this Post