IRONSMITHINTEL
HIGHCVSS7.8
|
Actively Exploited
|Auth: low — local user required|Reboot: required|Est. 30–60 minutes including reboot|Manual only

KB5040442: Windows Server 2019 / 2022 Cumulative Update (July 2024)

The July 2024 Patch Tuesday cumulative update for Windows Server 2019 and 2022 addresses 142 CVEs. Includes the fix for CVE-2024-38080, a Windows Hyper-V elevation of privilege zero-day that was being actively exploited at time of release.

Published Jul 9, 2024 · Updated May 10, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

CVE-2024-38080 allows a local attacker running code inside a Hyper-V guest virtual machine to escape the VM boundary and execute code on the host with SYSTEM privileges. This is a particularly severe vulnerability for multi-tenant environments or environments where guest VMs run workloads from different trust boundaries.

How the attack worksNo clicks needed

KB5040442 (Windows Server 2022) and KB5040430 (Windows Server 2019) address 142 CVEs in the July 2024 cycle. CVE-2024-38080, a Hyper-V elevation of privilege zero-day, was actively exploited at time of release. An attacker with guest VM access can exploit this to escape the VM and gain SYSTEM privileges on the Hyper-V host.

Am I affected?Quick check

Probably yes if any of these apply:

All Windows Server 2019 and 2022 systems
Hyper-V hosts
VM hosting environments
Running Windows Server 2022 prior to KB5040442 / Windows Server 2019 prior to KB5040430

Affected OS versions

Windows Server 2019Windows Server 2022
Fixed inKB5040442 (2022) / KB5040430 (2019)
Real-world incidentsWhat we've seen

A cloud service provider running Windows Server 2022 as their Hyper-V hypervisor platform is exposed to CVE-2024-38080. An attacker who compromises a guest VM — whether through a web application vulnerability or other means — can use this zero-day to break out of the VM and gain full control of the hypervisor host, accessing all other VMs on the same host.

How to patch

Manual download

For air-gapped servers or out-of-band deployment. Microsoft Update Catalog returns every OS-version variant of this update.

↗ Microsoft Update CatalogKB5040442

Manual remediation steps

30–60 minutes including reboot

Check Patch Status

# Windows Server 2022
Get-HotFix -Id KB5040442

# Windows Server 2019
Get-HotFix -Id KB5040430

Check Hyper-V Role

Get-WindowsFeature -Name Hyper-V | Select-Object Name, InstallState
# If Hyper-V is installed, this patch is critical priority

Apply

1
Download from https://catalog.update.microsoft.com
2
Install and restart

Verify

Get-HotFix -Id KB5040442  # or KB5040430
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.