-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512


   #####################################################
  ##  N C S C ~ B E V E I L I G I N G S A D V I E S  ##
 #####################################################

Titel           : Kwetsbaarheden verholpen in Microsoft Windows
Advisory ID     : NCSC-2024-0392
Versie          : 1.00
Kans            : medium
CVE ID          : CVE-2024-6197, CVE-2024-20659, CVE-2024-30092,
                  CVE-2024-37976, CVE-2024-37979, CVE-2024-37982,
                  CVE-2024-37983, CVE-2024-38029, CVE-2024-38124,
                  CVE-2024-38129, CVE-2024-38149, CVE-2024-38179,
                  CVE-2024-38212, CVE-2024-38261, CVE-2024-38262,
                  CVE-2024-38265, CVE-2024-43453, CVE-2024-43456,
                  CVE-2024-43500, CVE-2024-43501, CVE-2024-43502,
                  CVE-2024-43506, CVE-2024-43508, CVE-2024-43509,
                  CVE-2024-43511, CVE-2024-43512, CVE-2024-43513,
                  CVE-2024-43514, CVE-2024-43515, CVE-2024-43516,
                  CVE-2024-43517, CVE-2024-43518, CVE-2024-43519,
                  CVE-2024-43520, CVE-2024-43521, CVE-2024-43522,
                  CVE-2024-43523, CVE-2024-43524, CVE-2024-43525,
                  CVE-2024-43526, CVE-2024-43527, CVE-2024-43528,
                  CVE-2024-43529, CVE-2024-43532, CVE-2024-43533,
                  CVE-2024-43534, CVE-2024-43535, CVE-2024-43536,
                  CVE-2024-43537, CVE-2024-43538, CVE-2024-43540,
                  CVE-2024-43541, CVE-2024-43542, CVE-2024-43543,
                  CVE-2024-43544, CVE-2024-43545, CVE-2024-43546,
                  CVE-2024-43547, CVE-2024-43549, CVE-2024-43550,
                  CVE-2024-43551, CVE-2024-43552, CVE-2024-43553,
                  CVE-2024-43554, CVE-2024-43555, CVE-2024-43556,
                  CVE-2024-43557, CVE-2024-43558, CVE-2024-43559,
                  CVE-2024-43560, CVE-2024-43561, CVE-2024-43562,
                  CVE-2024-43563, CVE-2024-43564, CVE-2024-43565,
                  CVE-2024-43567, CVE-2024-43570, CVE-2024-43571,
                  CVE-2024-43572, CVE-2024-43573, CVE-2024-43574,
                  CVE-2024-43575, CVE-2024-43581, CVE-2024-43582,
                  CVE-2024-43583, CVE-2024-43584, CVE-2024-43585,
                  CVE-2024-43589, CVE-2024-43592, CVE-2024-43593,
                  CVE-2024-43599, CVE-2024-43607, CVE-2024-43608,
                  CVE-2024-43611, CVE-2024-43615
                  (Details over de kwetsbaarheden kunt u vinden op
                   de Mitre website: https://cve.mitre.org/cve/)
Schade          : high
                  Improper Input Validation
                  Integer Overflow or Wraparound
                  Numeric Truncation Error
                  Incorrect Access of Indexable Resource ('Range Error')
                  Loop with Unreachable Exit Condition ('Infinite Loop')
                  Double Free
                  Protection Mechanism Failure
                  Use After Free
                  Inclusion of Functionality from Untrusted Control
                  Sphere
                  Missing Authorization
                  URL Redirection to Untrusted Site ('Open Redirect')
                  Sensitive Data Storage in Improperly Locked Memory
                  Use of Uninitialized Resource
                  Time-of-check Time-of-use (TOCTOU) Race Condition
                  NULL Pointer Dereference
                  Stack-based Buffer Overflow
                  Untrusted Pointer Dereference
                  Execution with Unnecessary Privileges
                  Allocation of Resources Without Limits or Throttling
                  Improper Link Resolution Before File Access ('Link
                  Following')
                  Out-of-bounds Read
                  External Control of File Name or Path
                  Free of Memory not on the Heap
                  Improper Restriction of Communication Channel to
                  Intended Endpoints
                  Observable Discrepancy
                  Uncontrolled Resource Consumption
                  Improper Neutralization of Input During Web Page
                  Generation ('Cross-site Scripting')
                  Buffer Over-read
                  Improper Neutralization
                  Improper Access Control
                  Heap-based Buffer Overflow
                  Missing Cryptographic Step
                  Improper Authorization
                  Incorrect Check of Function Return Value
                  Improper Removal of Sensitive Information Before
                  Storage or Transfer
                  Improper Certificate Validation
                  Not Failing Securely ('Failing Open')
                  Improper Authentication
Uitgiftedatum   : 20241008
Toepassing      : microsoft azure_stack_hci
                  microsoft remote_desktop_client_for_windows_desktop
                  microsoft windows
                  microsoft windows_10_version_1507
                  microsoft windows_10_version_1607
                  microsoft windows_10_version_1809
                  microsoft windows_10_version_21h2
                  microsoft windows_10_version_22h2
                  microsoft windows_11_version_21h2
                  microsoft windows_11_version_22h2
                  microsoft windows_11_version_22h3
                  microsoft windows_11_version_23h2
                  microsoft windows_11_version_24h2
                  microsoft windows_server_2008__service_pack_2
                  microsoft windows_server_2008_r2_service_pack_1
                  microsoft windows_server_2008_r2_service_pack_1__serve
                  r_core_installation_
                  microsoft windows_server_2008_service_pack_2
                  microsoft windows_server_2008_service_pack_2__server_c
                  ore_installation_
                  microsoft windows_server_2012
                  microsoft
                  windows_server_2012__server_core_installation_
                  microsoft windows_server_2012_r2
                  microsoft
                  windows_server_2012_r2__server_core_installation_
                  microsoft windows_server_2016
                  microsoft
                  windows_server_2016__server_core_installation_
                  microsoft windows_server_2019
                  microsoft
                  windows_server_2019__server_core_installation_
                  microsoft windows_server_2022
                  microsoft windows_server_2022__23h2_edition__server_co
                  re_installation_
Versie(s)       :
Platform(s)     : microsoft windows
                  microsoft windows_10
                  microsoft windows_11
                  microsoft windows_server_2008
                  microsoft windows_server_2012
                  microsoft windows_server_2016
                  microsoft windows_server_2019
                  microsoft windows_server_2022
                  microsoft windows_server_2022_23h2

Beschrijving
   Microsoft heeft kwetsbaarheden verholpen in Windows.

   Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit
   te voeren die kunnen leiden tot onderstaande categorieën schade.
   De ernstigste kwetsbaarheid heeft kenmerk CVE-2024-38124 toegewezen
   gekregen en bevindt zich in de NETLOGON functionaliteit. Succesvol
   misbruik is echter niet eenvoudig en vereist voorafgaande kennis van
   de infrastructuur en precieze timing, waarbij een randvoorwaarde van
   succes is dat er een nieuwe Domain Controller wordt ingericht.
   ```
   Microsoft Simple Certificate Enrollment Protocol:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43541 | 7.50 | Denial-of-Service                   |
   | CVE-2024-43544 | 7.50 | Denial-of-Service                   |
   |----------------|------|-------------------------------------|
   Windows cURL Implementation:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-6197  | 8.80 | Uitvoeren van willekeurige code,    |
   |----------------|------|-------------------------------------|
   Windows Secure Channel:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43550 | 7.40 | Voordoen als andere gebruiker       |
   |----------------|------|-------------------------------------|
   Windows Remote Desktop:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43582 | 8.10 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Microsoft ActiveX:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43517 | 8.80 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Windows Telephony Server:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43518 | 8.80 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Windows Remote Desktop Services:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43456 | 4.80 | Manipuleren van gegevens            |
   |----------------|------|-------------------------------------|
   Windows MSHTML Platform:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43573 | 6.50 | Voordoen als andere gebruiker       |
   |----------------|------|-------------------------------------|
   Windows Mobile Broadband:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43525 | 6.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43526 | 6.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43537 | 6.50 | Denial-of-Service                   |
   | CVE-2024-43538 | 6.50 | Denial-of-Service                   |
   | CVE-2024-43540 | 6.50 | Denial-of-Service                   |
   | CVE-2024-43542 | 6.50 | Denial-of-Service                   |
   | CVE-2024-43543 | 6.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43523 | 6.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43524 | 6.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43536 | 6.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43555 | 6.50 | Denial-of-Service                   |
   | CVE-2024-43557 | 6.50 | Denial-of-Service                   |
   | CVE-2024-43558 | 6.50 | Denial-of-Service                   |
   | CVE-2024-43559 | 6.50 | Denial-of-Service                   |
   | CVE-2024-43561 | 6.50 | Denial-of-Service                   |
   |----------------|------|-------------------------------------|
   Windows Standards-Based Storage Management Service:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43512 | 6.50 | Denial-of-Service                   |
   |----------------|------|-------------------------------------|
   Microsoft WDAC OLE DB provider for SQL:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43519 | 8.80 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Remote Desktop Client:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43533 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43599 | 8.80 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Windows Kernel-Mode Drivers:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43535 | 7.00 | Verkrijgen van verhoogde rechten    |
   | CVE-2024-43554 | 5.50 | Toegang tot gevoelige gegevens      |
   |----------------|------|-------------------------------------|
   Code Integrity Guard:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43585 | 5.50 | Omzeilen van beveiligingsmaatregel  |
   |----------------|------|-------------------------------------|
   Windows Print Spooler Components:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43529 | 7.30 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Resilient File System (ReFS):
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43500 | 5.50 | Toegang tot gevoelige gegevens      |
   |----------------|------|-------------------------------------|
   Microsoft Management Console:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43572 | 7.80 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   RPC Endpoint Mapper Service:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43532 | 8.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Microsoft Graphics Component:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43508 | 5.50 | Toegang tot gevoelige gegevens      |
   | CVE-2024-43534 | 6.50 | Toegang tot gevoelige gegevens      |
   | CVE-2024-43509 | 7.80 | Verkrijgen van verhoogde rechten    |
   | CVE-2024-43556 | 7.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Local Security Authority (LSA):
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43522 | 7.00 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Sudo for Windows:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43571 | 5.60 | Voordoen als andere gebruiker       |
   |----------------|------|-------------------------------------|
   Windows Scripting:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43584 | 7.70 | Omzeilen van beveiligingsmaatregel  |
   |----------------|------|-------------------------------------|
   Winlogon:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43583 | 7.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Kerberos:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-38129 | 7.50 | Verkrijgen van verhoogde rechten    |
   | CVE-2024-43547 | 6.50 | Toegang tot gevoelige gegevens      |
   |----------------|------|-------------------------------------|
   Windows Cryptographic Services:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43546 | 5.60 | Toegang tot gevoelige gegevens      |
   |----------------|------|-------------------------------------|
   Windows Routing and Remote Access Service (RRAS):
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-38261 | 7.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43608 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43607 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-38265 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43453 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-38212 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43549 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43564 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43589 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43592 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43593 | 8.80 | Uitvoeren van willekeurige code     |
   | CVE-2024-43611 | 8.80 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Windows EFI Partition:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-37976 | 6.70 | Omzeilen van beveiligingsmaatregel  |
   | CVE-2024-37982 | 6.70 | Omzeilen van beveiligingsmaatregel  |
   | CVE-2024-37983 | 6.70 | Omzeilen van beveiligingsmaatregel  |
   |----------------|------|-------------------------------------|
   Role: Windows Hyper-V:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-20659 | 7.10 | Omzeilen van beveiligingsmaatregel  |
   | CVE-2024-43521 | 7.50 | Denial-of-Service                   |
   | CVE-2024-43567 | 7.50 | Denial-of-Service                   |
   | CVE-2024-43575 | 7.50 | Denial-of-Service                   |
   |----------------|------|-------------------------------------|
   Windows Hyper-V:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-30092 | 8.00 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Windows NT OS Kernel:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43553 | 7.40 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Network Address Translation (NAT):
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43562 | 7.50 | Denial-of-Service                   |
   | CVE-2024-43565 | 7.50 | Denial-of-Service                   |
   |----------------|------|-------------------------------------|
   Windows Remote Desktop Licensing Service:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-38262 | 7.50 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   OpenSSH for Windows:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43581 | 7.10 | Uitvoeren van willekeurige code     |
   | CVE-2024-43615 | 7.10 | Uitvoeren van willekeurige code     |
   | CVE-2024-38029 | 7.50 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Windows NTFS:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43514 | 7.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Netlogon:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-38124 | 9.00 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Storage Port Driver:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43560 | 7.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Common Log File System Driver:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43501 | 7.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Secure Kernel Mode:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43516 | 7.80 | Verkrijgen van verhoogde rechten    |
   | CVE-2024-43528 | 7.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Microsoft Windows Speech:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43574 | 8.30 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   Windows Ancillary Function Driver for WinSock:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43563 | 7.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows BitLocker:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43513 | 6.40 | Omzeilen van beveiligingsmaatregel  |
   |----------------|------|-------------------------------------|
   Windows Online Certificate Status Protocol (OCSP):
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43545 | 7.50 | Denial-of-Service                   |
   |----------------|------|-------------------------------------|
   Internet Small Computer Systems Interface (iSCSI):
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43515 | 7.50 | Denial-of-Service                   |
   |----------------|------|-------------------------------------|
   Windows Kernel:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43502 | 7.10 | Verkrijgen van verhoogde rechten    |
   | CVE-2024-43527 | 7.80 | Verkrijgen van verhoogde rechten    |
   | CVE-2024-37979 | 6.70 | Verkrijgen van verhoogde rechten    |
   | CVE-2024-43511 | 7.00 | Verkrijgen van verhoogde rechten    |
   | CVE-2024-43520 | 5.00 | Denial-of-Service                   |
   | CVE-2024-43570 | 6.40 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Azure Stack:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-38179 | 8.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Storage:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43551 | 7.80 | Verkrijgen van verhoogde rechten    |
   |----------------|------|-------------------------------------|
   Windows Shell:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43552 | 7.30 | Uitvoeren van willekeurige code     |
   |----------------|------|-------------------------------------|
   BranchCache:
   |----------------|------|-------------------------------------|
   | CVE-ID         | CVSS | Impact                              |
   |----------------|------|-------------------------------------|
   | CVE-2024-43506 | 7.50 | Denial-of-Service                   |
   | CVE-2024-38149 | 7.50 | Denial-of-Service                   |
   |----------------|------|-------------------------------------|
   ```

Mogelijke oplossingen
   Microsoft heeft updates beschikbaar gesteld waarmee de beschreven
   kwetsbaarheden worden verholpen. We raden u aan om deze updates te
   installeren. Meer informatie over de kwetsbaarheden, de installatie
   van de updates en eventuele work-arounds vindt u op:
   https://portal.msrc.microsoft.com/en-us/security-guidance

   Referenties:


Vrijwaringsverklaring
   Door gebruik van deze security advisory gaat u akkoord met de
   navolgende voorwaarden. Ondanks dat het NCSC de grootst mogelijke
   zorg heeft betracht bij de samenstelling van dit beveiligingsadvies,
   kan het NCSC niet instaan voor de volledigheid, juistheid of
   (voortdurende) actualiteit van dit beveiligingsadvies. De informatie
   in dit beveiligingsadvies is uitsluitend bedoeld als algemene
   informatie voor professionele partijen. Aan de informatie in dit
   beveiligingsadvies kunnen geen rechten worden ontleend. Het NCSC
   en de Staat zijn niet aansprakelijk voor enige schade ten gevolge
   van het gebruik of de onmogelijkheid van het gebruik van dit
   beveiligingsadvies, waaronder begrepen schade ten gevolge van de
   onjuistheid of onvolledigheid van de informatie in dit
   beveiligingsadvies. Op dit beveiligingsadvies is Nederlands recht
   van toepassing. Alle geschillen in verband met en/of voortvloeiend
   uit dit beveiligingsadvies zullen worden voorgelegd aan de exclusief
   bevoegde rechter te Den Haag. Deze rechtskeuze geldt tevens voor de
   voorzieningenrechter in kort geding.

-----BEGIN PGP SIGNATURE-----
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=mRdO
-----END PGP SIGNATURE-----