Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-3657
Vulnerability from csaf_certbund
Published
2024-12-10 23:00
Modified
2025-01-02 23:00
Summary
Microsoft Windows: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Windows ist ein Betriebssystem von Microsoft.
Angriff
Ein Angreifer kann mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Situation zu erzeugen.
Betroffene Betriebssysteme
- Windows
{ document: { aggregate_severity: { text: "kritisch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Windows ist ein Betriebssystem von Microsoft.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in verschiedenen Versionen von Microsoft Windows und Microsoft Windows Server ausnutzen, um seine Privilegien zu erhöhen, beliebigen Code auszuführen, vertrauliche Informationen offenzulegen und einen Denial-of-Service-Situation zu erzeugen.", title: "Angriff", }, { category: "general", text: "- Windows", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-3657 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3657.json", }, { category: "self", summary: "WID-SEC-2024-3657 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3657", }, { category: "external", summary: "Microsoft Leitfaden für Sicherheitsupdates", url: "https://msrc.microsoft.com/update-guide/", }, { category: "external", summary: "PoC CVE-2024-49112 vom 2025-01-01", url: "https://github.com/SafeBreach-Labs/CVE-2024-49112", }, { category: "external", summary: "PoC CVE-2024-49113 vom 2025-01-02", url: "https://www.safebreach.com/blog/ldapnightmare-safebreach-labs-publishes-first-proof-of-concept-exploit-for-cve-2024-49113/", }, ], source_lang: "en-US", title: "Microsoft Windows: Mehrere Schwachstellen", tracking: { current_release_date: "2025-01-02T23:00:00.000+00:00", generator: { date: "2025-01-03T09:12:19.873+00:00", engine: { name: "BSI-WID", version: "1.3.10", }, }, id: "WID-SEC-W-2024-3657", initial_release_date: "2024-12-10T23:00:00.000+00:00", revision_history: [ { date: "2024-12-10T23:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2025-01-01T23:00:00.000+00:00", number: "2", summary: "PoC für CVE-2024-49112 ergänzt", }, { date: "2025-01-02T23:00:00.000+00:00", number: "3", summary: "PoC für CVE-2024-49113 ergänzt", }, ], status: "final", version: "3", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_name", name: "Microsoft Windows 10", product: { name: "Microsoft Windows 10", product_id: "T039740", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_10:-", }, }, }, { category: "product_version", name: "Version 1607", product: { name: "Microsoft Windows 10 Version 1607", product_id: "T039742", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_10:version_1607", }, }, }, { category: "product_version", name: "Version 1809", product: { name: "Microsoft Windows 10 Version 1809", product_id: "T039743", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_10:version_1809", }, }, }, { category: "product_version", name: "Version 21H2", product: { name: "Microsoft Windows 10 Version 21H2", product_id: "T039746", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_10:version_21h2", }, }, }, { category: "product_version", name: "Version 22H2", product: { name: "Microsoft Windows 10 Version 22H2", product_id: "T039748", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_10:version_22h2", }, }, }, ], category: "product_name", name: "Windows 10", }, { branches: [ { category: "product_version", name: "Version 22H2", product: { name: "Microsoft Windows 11 Version 22H2", product_id: "T039747", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_11:version_22h2", }, }, }, { category: "product_version", name: "Version 23H2", product: { name: "Microsoft Windows 11 Version 23H2", product_id: "T039749", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_11:version_23h2", }, }, }, { category: "product_version", name: "Version 24H2", product: { name: "Microsoft Windows 11 Version 24H2", product_id: "T039751", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_11:version_24h2", }, }, }, ], category: "product_name", name: "Windows 11", }, { branches: [ { category: "product_version", name: "2008 R2 SP1", product: { name: "Microsoft Windows Server 2008 R2 SP1", product_id: "T039736", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server:2008_r2_sp1", }, }, }, { category: "product_version", name: "2008 SP2", product: { name: "Microsoft Windows Server 2008 SP2", product_id: "T039737", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server:2008_sp2", }, }, }, { category: "product_version", name: "2025", product: { name: "Microsoft Windows Server 2025", product_id: "T039752", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server:2025", }, }, }, ], category: "product_name", name: "Windows Server", }, { category: "product_name", name: "Microsoft Windows Server 2012", product: { name: "Microsoft Windows Server 2012", product_id: "T039738", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server_2012:-", }, }, }, { category: "product_name", name: "Microsoft Windows Server 2012 R2", product: { name: "Microsoft Windows Server 2012 R2", product_id: "T039739", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server_2012_r2:-", }, }, }, { category: "product_name", name: "Microsoft Windows Server 2016", product: { name: "Microsoft Windows Server 2016", product_id: "T039741", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server_2016:-", }, }, }, { category: "product_name", name: "Microsoft Windows Server 2019", product: { name: "Microsoft Windows Server 2019", product_id: "T039744", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server_2019:-", }, }, }, { branches: [ { category: "product_name", name: "Microsoft Windows Server 2022", product: { name: "Microsoft Windows Server 2022", product_id: "T039745", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server_2022:-", }, }, }, { category: "product_version", name: "23H2 Edition", product: { name: "Microsoft Windows Server 2022 23H2 Edition", product_id: "T039750", product_identification_helper: { cpe: "cpe:/o:microsoft:windows_server_2022:23h2_edition", }, }, }, ], category: "product_name", name: "Windows Server 2022", }, ], category: "vendor", name: "Microsoft", }, ], }, vulnerabilities: [ { cve: "CVE-2024-49072", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49072", }, { cve: "CVE-2024-49073", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49073", }, { cve: "CVE-2024-49074", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49074", }, { cve: "CVE-2024-49075", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49075", }, { cve: "CVE-2024-49076", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49076", }, { cve: "CVE-2024-49077", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49077", }, { cve: "CVE-2024-49078", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49078", }, { cve: "CVE-2024-49079", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49079", }, { cve: "CVE-2024-49080", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49080", }, { cve: "CVE-2024-49081", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49081", }, { cve: "CVE-2024-49082", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49082", }, { cve: "CVE-2024-49083", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49083", }, { cve: "CVE-2024-49084", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49084", }, { cve: "CVE-2024-49085", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49085", }, { cve: "CVE-2024-49086", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49086", }, { cve: "CVE-2024-49087", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49087", }, { cve: "CVE-2024-49088", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49088", }, { cve: "CVE-2024-49089", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49089", }, { cve: "CVE-2024-49090", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49090", }, { cve: "CVE-2024-49091", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49091", }, { cve: "CVE-2024-49092", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49092", }, { cve: "CVE-2024-49093", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49093", }, { cve: "CVE-2024-49094", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49094", }, { cve: "CVE-2024-49095", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49095", }, { cve: "CVE-2024-49096", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49096", }, { cve: "CVE-2024-49097", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49097", }, { cve: "CVE-2024-49098", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49098", }, { cve: "CVE-2024-49099", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49099", }, { cve: "CVE-2024-49101", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49101", }, { cve: "CVE-2024-49102", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49102", }, { cve: "CVE-2024-49103", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49103", }, { cve: "CVE-2024-49104", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49104", }, { cve: "CVE-2024-49105", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49105", }, { cve: "CVE-2024-49106", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49106", }, { cve: "CVE-2024-49107", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49107", }, { cve: "CVE-2024-49108", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49108", }, { cve: "CVE-2024-49109", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49109", }, { cve: "CVE-2024-49110", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49110", }, { cve: "CVE-2024-49111", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49111", }, { cve: "CVE-2024-49112", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49112", }, { cve: "CVE-2024-49113", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49113", }, { cve: "CVE-2024-49114", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49114", }, { cve: "CVE-2024-49115", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49115", }, { cve: "CVE-2024-49116", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49116", }, { cve: "CVE-2024-49117", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49117", }, { cve: "CVE-2024-49118", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49118", }, { cve: "CVE-2024-49119", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49119", }, { cve: "CVE-2024-49120", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49120", }, { cve: "CVE-2024-49121", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49121", }, { cve: "CVE-2024-49122", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49122", }, { cve: "CVE-2024-49123", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49123", }, { cve: "CVE-2024-49124", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49124", }, { cve: "CVE-2024-49125", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49125", }, { cve: "CVE-2024-49126", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49126", }, { cve: "CVE-2024-49127", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49127", }, { cve: "CVE-2024-49128", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49128", }, { cve: "CVE-2024-49129", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49129", }, { cve: "CVE-2024-49132", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49132", }, { cve: "CVE-2024-49138", notes: [ { category: "description", text: "In Microsoft Windows und Microsoft Windows Server existieren mehrere Schwachstellen. Ein Angreifer kann diese Schwachstellen ausnutzen, um erweiterte Rechte, einschließlich SYSTEM-Rechten, zu erlangen, um beliebigen Code auszuführen - sogar im Kontext des SYSTEM-Kontos -, um vertrauliche persönliche Informationen und Speicherinhalte offenzulegen und um einen Denial-of-Service-Zustand herbeizuführen. Viele der Schwachstellen erfordern Benutzerinteraktion, um erfolgreich ausgenutzt zu werden. Das Opfer muss eine bösartige Datei öffnen oder dazu gebracht werden, eine Anfrage an einen bösartigen Server zu senden. Bei einigen Schwachstellen müssen spezielle Bedingungen erfüllt sein: Der Angreifer muss eine Race-Condition gewinnen oder physischen Zugriff auf den Zielcomputer haben, um ein bösartiges USB-Laufwerk einstecken zu können. Einige Schwachstellen erfordern erweiterte Rechte, einschließlich Administratorrechten, um erfolgreich ausgenutzt zu werden. Einige Schwachstellen können sich über die betroffenen Komponenten hinaus auswirken.", }, ], product_status: { known_affected: [ "T039737", "T039748", "T039736", "T039747", "T039739", "T039738", "T039749", "T039744", "T039743", "T039746", "T039745", "T039740", "T039751", "T039750", "T039742", "T039741", "T039752", ], }, release_date: "2024-12-10T23:00:00.000+00:00", title: "CVE-2024-49138", }, ], }
cve-2024-49072
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Task Scheduler Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49072 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49072", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-07T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-08T04:56:03.893Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Task Scheduler Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:30.632Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Task Scheduler Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49072", }, ], title: "Windows Task Scheduler Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49072", datePublished: "2024-12-10T17:49:36.638Z", dateReserved: "2024-10-11T20:57:49.195Z", dateUpdated: "2025-03-11T16:44:30.632Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49073
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49073 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49073", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:55:06.246562Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:09:01.417Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20: Improper Input Validation", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:06.543Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49073", }, ], title: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49073", datePublished: "2024-12-10T17:49:08.206Z", dateReserved: "2024-10-11T20:57:49.195Z", dateUpdated: "2025-03-11T16:44:06.543Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49123
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49123 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49123", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:43.271694Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:26:44.659Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:23.939Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49123", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49123", datePublished: "2024-12-10T17:49:24.913Z", dateReserved: "2024-10-11T20:57:49.208Z", dateUpdated: "2025-03-11T16:44:23.939Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49128
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49128 | vendor-advisory |
Impacted products
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49128", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:51:34.404743Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:06:18.106Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:41.498Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49128", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49128", datePublished: "2024-12-10T17:49:47.953Z", dateReserved: "2024-10-11T20:57:49.209Z", dateUpdated: "2025-03-11T16:44:41.498Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49104
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49104 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49104", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:21.641437Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:12:16.655Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:17.520Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49104", }, ], title: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49104", datePublished: "2024-12-10T17:49:18.597Z", dateReserved: "2024-10-11T20:57:49.205Z", dateUpdated: "2025-03-11T16:44:17.520Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49096
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49096 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49096", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-12T19:29:15.675200Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-12T19:31:22.231Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400: Uncontrolled Resource Consumption", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:13.202Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49096", }, ], title: "Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49096", datePublished: "2024-12-10T17:49:14.446Z", dateReserved: "2024-10-11T20:57:49.202Z", dateUpdated: "2025-03-11T16:44:13.202Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49086
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49086 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49086", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:54.193358Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:10:12.897Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:08.779Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49086", }, ], title: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49086", datePublished: "2024-12-10T17:49:10.485Z", dateReserved: "2024-10-11T20:57:49.199Z", dateUpdated: "2025-03-11T16:44:08.779Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49095
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49095 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49095", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:52:12.370512Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:02:57.818Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, { cweId: "CWE-415", description: "CWE-415: Double Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:37.514Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49095", }, ], title: "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49095", datePublished: "2024-12-10T17:49:42.945Z", dateReserved: "2024-10-11T20:57:49.201Z", dateUpdated: "2025-03-11T16:44:37.514Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49114
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49114 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49114", options: [ { Exploitation: "poc", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-06T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-07T04:56:19.257Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-820", description: "CWE-820: Missing Synchronization", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:39.812Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49114", }, ], title: "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49114", datePublished: "2024-12-10T17:49:45.853Z", dateReserved: "2024-10-11T20:57:49.206Z", dateUpdated: "2025-03-11T16:44:39.812Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49121
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49121 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49121", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-12T19:29:13.265794Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-12T19:30:56.071Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-476", description: "CWE-476: NULL Pointer Dereference", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:22.766Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49121", }, ], title: "Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49121", datePublished: "2024-12-10T17:49:23.739Z", dateReserved: "2024-10-11T20:57:49.208Z", dateUpdated: "2025-03-11T16:44:22.766Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49125
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49125 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49125", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:35.900957Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:27:10.043Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:25.185Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49125", }, ], title: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49125", datePublished: "2024-12-10T17:49:26.118Z", dateReserved: "2024-10-11T20:57:49.208Z", dateUpdated: "2025-03-11T16:44:25.185Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49127
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49127 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49127", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:51:37.791794Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:06:06.328Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:41.015Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49127", }, ], title: "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49127", datePublished: "2024-12-10T17:49:47.340Z", dateReserved: "2024-10-11T20:57:49.208Z", dateUpdated: "2025-03-11T16:44:41.015Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49085
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49085 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49085", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:56.904105Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:10:01.552Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190: Integer Overflow or Wraparound", lang: "en-US", type: "CWE", }, { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:08.256Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49085", }, ], title: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49085", datePublished: "2024-12-10T17:49:09.949Z", dateReserved: "2024-10-11T20:57:49.199Z", dateUpdated: "2025-03-11T16:44:08.256Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49102
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49102 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49102", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:29.839780Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:12:06.970Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:16.342Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49102", }, ], title: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49102", datePublished: "2024-12-10T17:49:17.421Z", dateReserved: "2024-10-11T20:57:49.204Z", dateUpdated: "2025-03-11T16:44:16.342Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49109
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49109 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49109", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:52:09.445211Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:03:13.355Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:44.358Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49109", }, ], title: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49109", datePublished: "2024-12-10T17:49:43.471Z", dateReserved: "2024-10-11T20:57:49.206Z", dateUpdated: "2025-03-11T16:44:44.358Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49079
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Input Method Editor (IME) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49079 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49079", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-07T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-08T04:56:07.689Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Input Method Editor (IME) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:33.660Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Input Method Editor (IME) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49079", }, ], title: "Input Method Editor (IME) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49079", datePublished: "2024-12-10T17:49:39.279Z", dateReserved: "2024-10-11T20:57:49.197Z", dateUpdated: "2025-03-11T16:44:33.660Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49103
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49103 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49103", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-12T19:28:13.095720Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-12T19:31:03.314Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-191", description: "CWE-191: Integer Underflow (Wrap or Wraparound)", lang: "en-US", type: "CWE", }, { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:16.942Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49103", }, ], title: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49103", datePublished: "2024-12-10T17:49:18.053Z", dateReserved: "2024-10-11T20:57:49.205Z", dateUpdated: "2025-03-11T16:44:16.942Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49074
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49074 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49074", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-07T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-08T04:56:05.187Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:07.133Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49074", }, ], title: "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49074", datePublished: "2024-12-10T17:49:08.726Z", dateReserved: "2024-10-11T20:57:49.196Z", dateUpdated: "2025-03-11T16:44:07.133Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49089
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49089 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49089", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:51.299413Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:10:22.831Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190: Integer Overflow or Wraparound", lang: "en-US", type: "CWE", }, { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:10.057Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49089", }, ], title: "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49089", datePublished: "2024-12-10T17:49:11.593Z", dateReserved: "2024-10-11T20:57:49.200Z", dateUpdated: "2025-03-11T16:44:10.057Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49110
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49110 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49110", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:52:06.657049Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:03:34.653Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:38.079Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49110", }, ], title: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49110", datePublished: "2024-12-10T17:49:44.052Z", dateReserved: "2024-10-11T20:57:49.206Z", dateUpdated: "2025-03-11T16:44:38.079Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49107
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
WmsRepair Service Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49107 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49107", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:16.332426Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:12:53.549Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "WmsRepair Service Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.3, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-59", description: "CWE-59: Improper Link Resolution Before File Access ('Link Following')", lang: "en-US", type: "CWE", }, { cweId: "CWE-284", description: "CWE-284: Improper Access Control", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:19.303Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "WmsRepair Service Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49107", }, ], title: "WmsRepair Service Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49107", datePublished: "2024-12-10T17:49:19.766Z", dateReserved: "2024-10-11T20:57:49.205Z", dateUpdated: "2025-03-11T16:44:19.303Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49116
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49116 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.7009 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49116", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:51:44.187851Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:04:29.043Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.7009", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.7009", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7876", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7876", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.7009", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.7009", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7876", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7876", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:44.912Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49116", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49116", datePublished: "2024-12-10T17:49:46.366Z", dateReserved: "2024-10-11T20:57:49.207Z", dateUpdated: "2025-03-11T16:44:44.912Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49078
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49078 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49078", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:52:52.580509Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:46:42.938Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190: Integer Overflow or Wraparound", lang: "en-US", type: "CWE", }, { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:32.998Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49078", }, ], title: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49078", datePublished: "2024-12-10T17:49:38.763Z", dateReserved: "2024-10-11T20:57:49.196Z", dateUpdated: "2025-03-11T16:44:32.998Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49132
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49132 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49132", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:27.499907Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T22:00:13.176Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:26.835Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49132", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49132", datePublished: "2024-12-10T17:49:27.674Z", dateReserved: "2024-10-11T20:57:49.209Z", dateUpdated: "2025-03-11T16:44:26.835Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49080
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49080 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49080", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-07T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-08T04:56:08.892Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows IP Routing Management Snapin Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:34.202Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows IP Routing Management Snapin Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49080", }, ], title: "Windows IP Routing Management Snapin Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49080", datePublished: "2024-12-10T17:49:39.806Z", dateReserved: "2024-10-11T20:57:49.197Z", dateUpdated: "2025-03-11T16:44:34.202Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49092
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49092 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49092", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:44.655900Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:10:46.256Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:11.412Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49092", }, ], title: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49092", datePublished: "2024-12-10T17:49:12.856Z", dateReserved: "2024-10-11T20:57:49.200Z", dateUpdated: "2025-03-11T16:44:11.412Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49115
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49115 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49115", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:02.475744Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:13:30.814Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:21.004Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49115", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49115", datePublished: "2024-12-10T17:49:21.638Z", dateReserved: "2024-10-11T20:57:49.207Z", dateUpdated: "2025-03-11T16:44:21.004Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49122
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49122 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49122", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:47.823939Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:26:33.223Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:23.352Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49122", }, ], title: "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49122", datePublished: "2024-12-10T17:49:24.325Z", dateReserved: "2024-10-11T20:57:49.208Z", dateUpdated: "2025-03-11T16:44:23.352Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49094
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49094 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49094", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:38.303081Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:11:17.630Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:12.496Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49094", }, ], title: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49094", datePublished: "2024-12-10T17:49:13.894Z", dateReserved: "2024-10-11T20:57:49.201Z", dateUpdated: "2025-03-11T16:44:12.496Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49099
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49099 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49099", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-12T19:28:15.683988Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-12T19:31:09.398Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:15.090Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49099", }, ], title: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49099", datePublished: "2024-12-10T17:49:16.204Z", dateReserved: "2024-10-11T20:57:49.204Z", dateUpdated: "2025-03-11T16:44:15.090Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49091
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Domain Name Service Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49091 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49091", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:48.639800Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:10:35.250Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Domain Name Service Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.2, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:10.600Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Domain Name Service Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49091", }, ], title: "Windows Domain Name Service Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49091", datePublished: "2024-12-10T17:49:12.325Z", dateReserved: "2024-10-11T20:57:49.200Z", dateUpdated: "2025-03-11T16:44:10.600Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49105
Vulnerability from cvelistv5
Published
2024-12-10 20:06
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Remote Desktop Client Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49105 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49105", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:51:31.558071Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:06:39.418Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "Unknown", ], product: "Remote Desktop client for Windows Desktop", vendor: "Microsoft", versions: [ { lessThan: "1.2.5716.0", status: "affected", version: "1.2.0.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "Unknown", ], product: "Windows App Client for Windows Desktop", vendor: "Microsoft", versions: [ { lessThan: "2.0.327.0", status: "affected", version: "1.00", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:remote_desktop:*:*:*:*:*:windows:*:*", versionEndExcluding: "1.2.5716.0", versionStartIncluding: "1.2.0.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:windows_app_client_for_windows_desktop:*:*:*:*:*:windows:*:*", versionEndExcluding: "2.0.327.0", versionStartIncluding: "1.00", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Remote Desktop Client Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.4, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-284", description: "CWE-284: Improper Access Control", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:18.174Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Remote Desktop Client Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49105", }, ], title: "Remote Desktop Client Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49105", datePublished: "2024-12-10T20:06:24.955Z", dateReserved: "2024-10-11T20:57:49.205Z", dateUpdated: "2025-03-11T16:44:18.174Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49117
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Hyper-V Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49117 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2022 |
Version: 10.0.20348.0 < 10.0.20348.2966 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49117", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:56.859672Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:25:30.537Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Hyper-V Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-393", description: "CWE-393: Return of Wrong Status Code", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:21.593Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Hyper-V Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49117", }, ], title: "Windows Hyper-V Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49117", datePublished: "2024-12-10T17:49:22.184Z", dateReserved: "2024-10-11T20:57:49.207Z", dateUpdated: "2025-03-11T16:44:21.593Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49084
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Kernel Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49084 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49084", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:59.963764Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:09:50.998Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Kernel Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-362", description: "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:07.673Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Kernel Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49084", }, ], title: "Windows Kernel Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49084", datePublished: "2024-12-10T17:49:09.301Z", dateReserved: "2024-10-11T20:57:49.199Z", dateUpdated: "2025-03-11T16:44:07.673Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49077
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49077 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49077", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:00.658487Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:46:32.392Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-191", description: "CWE-191: Integer Underflow (Wrap or Wraparound)", lang: "en-US", type: "CWE", }, { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:32.437Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49077", }, ], title: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49077", datePublished: "2024-12-10T17:49:38.294Z", dateReserved: "2024-10-11T20:57:49.196Z", dateUpdated: "2025-03-11T16:44:32.437Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49126
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49126 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49126", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:33.264725Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:27:20.420Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:25.732Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49126", }, ], title: "Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49126", datePublished: "2024-12-10T17:49:26.647Z", dateReserved: "2024-10-11T20:57:49.208Z", dateUpdated: "2025-03-11T16:44:25.732Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49138
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Common Log File System Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49138", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-05T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2024-12-10", reference: "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-12-19T04:55:26.043Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, timeline: [ { lang: "en", time: "2024-12-10T00:00:00+00:00", value: "CVE-2024-49138 added to CISA KEV", }, ], title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:42.046Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49138", }, ], title: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49138", datePublished: "2024-12-10T17:49:48.419Z", dateReserved: "2024-10-11T20:57:49.210Z", dateUpdated: "2025-03-11T16:44:42.046Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49076
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49076 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49076", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-07T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-08T04:56:06.414Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-287", description: "CWE-287: Improper Authentication", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:31.796Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49076", }, ], title: "Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49076", datePublished: "2024-12-10T17:49:37.702Z", dateReserved: "2024-10-11T20:57:49.196Z", dateUpdated: "2025-03-11T16:44:31.796Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49124
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49124 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49124", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:39.532156Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:26:57.743Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-362", description: "CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:24.544Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49124", }, ], title: "Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49124", datePublished: "2024-12-10T17:49:25.530Z", dateReserved: "2024-10-11T20:57:49.208Z", dateUpdated: "2025-03-11T16:44:24.544Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49112
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49112 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49112", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-05T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-04T04:55:27.553Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-190", description: "CWE-190: Integer Overflow or Wraparound", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:38.633Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49112", }, ], title: "Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49112", datePublished: "2024-12-10T17:49:44.679Z", dateReserved: "2024-10-11T20:57:49.206Z", dateUpdated: "2025-03-11T16:44:38.633Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49111
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49111 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49111", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:07.899721Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:13:19.387Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:20.492Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49111", }, ], title: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49111", datePublished: "2024-12-10T17:49:21.121Z", dateReserved: "2024-10-11T20:57:49.206Z", dateUpdated: "2025-03-11T16:44:20.492Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49098
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49098 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49098", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-12T19:28:18.191257Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-12T19:31:15.817Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:14.503Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49098", }, ], title: "Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49098", datePublished: "2024-12-10T17:49:15.538Z", dateReserved: "2024-10-11T20:57:49.203Z", dateUpdated: "2025-03-11T16:44:14.503Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49093
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49093 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2025 |
Version: 10.0.26100.0 < 10.0.26100.2605 |
|||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49093", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:41.144012Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:11:00.402Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-681", description: "CWE-681: Incorrect Conversion between Numeric Types", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:12.002Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49093", }, ], title: "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49093", datePublished: "2024-12-10T17:49:13.358Z", dateReserved: "2024-10-11T20:57:49.201Z", dateUpdated: "2025-03-11T16:44:12.002Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49119
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49119 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49119", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:54.352229Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:26:09.841Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-843", description: "CWE-843: Access of Resource Using Incompatible Type ('Type Confusion')", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:22.177Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49119", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49119", datePublished: "2024-12-10T17:49:22.782Z", dateReserved: "2024-10-11T20:57:49.207Z", dateUpdated: "2025-03-11T16:44:22.177Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49101
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49101 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49101", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:33.104638Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:11:54.253Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:15.734Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49101", }, ], title: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49101", datePublished: "2024-12-10T17:49:16.795Z", dateReserved: "2024-10-11T20:57:49.204Z", dateUpdated: "2025-03-11T16:44:15.734Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49081
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49081 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49081", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:52:36.766192Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:01:14.773Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-122", description: "CWE-122: Heap-based Buffer Overflow", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:34.753Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49081", }, ], title: "Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49081", datePublished: "2024-12-10T17:49:40.440Z", dateReserved: "2024-10-11T20:57:49.197Z", dateUpdated: "2025-03-11T16:44:34.753Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49082
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows File Explorer Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49082 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49082", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-07T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-08T04:56:10.407Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows File Explorer Information Disclosure Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-22", description: "CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:35.299Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows File Explorer Information Disclosure Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49082", }, ], title: "Windows File Explorer Information Disclosure Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49082", datePublished: "2024-12-10T17:49:40.960Z", dateReserved: "2024-10-11T20:57:49.197Z", dateUpdated: "2025-03-11T16:44:35.299Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49120
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49120 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6775 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49120", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:51.668825Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:26:21.327Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6775", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6775", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.3091", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2894", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1369", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2894", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7699", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7699", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22371", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22371", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6775", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6775", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.3091", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2894", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1369", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2894", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7699", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7699", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22371", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22371", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-453", description: "CWE-453: Insecure Default Variable Initialization", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:43.879Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49120", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49120", datePublished: "2024-12-10T17:49:23.239Z", dateReserved: "2024-10-11T20:57:49.207Z", dateUpdated: "2025-03-11T16:44:43.879Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49083
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49083 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49083", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:52:20.833429Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:02:12.766Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.8, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:35.777Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49083", }, ], title: "Windows Mobile Broadband Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49083", datePublished: "2024-12-10T17:49:41.403Z", dateReserved: "2024-10-11T20:57:49.197Z", dateUpdated: "2025-03-11T16:44:35.777Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49097
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49097 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49097", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:35.813173Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:11:41.719Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:13.771Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49097", }, ], title: "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49097", datePublished: "2024-12-10T17:49:15.025Z", dateReserved: "2024-10-11T20:57:49.203Z", dateUpdated: "2025-03-11T16:44:13.771Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49106
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49106 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49106", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:19.100489Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:12:43.494Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:18.754Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49106", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49106", datePublished: "2024-12-10T17:49:19.249Z", dateReserved: "2024-10-11T20:57:49.205Z", dateUpdated: "2025-03-11T16:44:18.754Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49129
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49129 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49129", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:53:30.627694Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:35:10.707Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400: Uncontrolled Resource Consumption", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:26.283Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49129", }, ], title: "Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49129", datePublished: "2024-12-10T17:49:27.121Z", dateReserved: "2024-10-11T20:57:49.209Z", dateUpdated: "2025-03-11T16:44:26.283Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49108
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49108 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2019 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49108", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:54:12.378344Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:13:06.179Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-591", description: "CWE-591: Sensitive Data Storage in Improperly Locked Memory", lang: "en-US", type: "CWE", }, { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:19.870Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49108", }, ], title: "Windows Remote Desktop Services Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49108", datePublished: "2024-12-10T17:49:20.444Z", dateReserved: "2024-10-11T20:57:49.206Z", dateUpdated: "2025-03-11T16:44:19.870Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49087
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Mobile Broadband Driver Information Disclosure Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49087 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49087", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-12T19:28:20.688127Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-12T19:31:28.622Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Mobile Broadband Driver Information Disclosure Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 4.6, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20: Improper Input Validation", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:09.414Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Mobile Broadband Driver Information Disclosure Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49087", }, ], title: "Windows Mobile Broadband Driver Information Disclosure Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49087", datePublished: "2024-12-10T17:49:11.029Z", dateReserved: "2024-10-11T20:57:49.199Z", dateUpdated: "2025-03-11T16:44:09.414Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49075
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Remote Desktop Services Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49075 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49075", options: [ { Exploitation: "none", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-12T19:29:10.826210Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-12T19:30:35.841Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Remote Desktop Services Denial of Service Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-400", description: "CWE-400: Uncontrolled Resource Consumption", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:31.253Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Remote Desktop Services Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49075", }, ], title: "Windows Remote Desktop Services Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49075", datePublished: "2024-12-10T17:49:37.085Z", dateReserved: "2024-10-11T20:57:49.196Z", dateUpdated: "2025-03-11T16:44:31.253Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49113
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-04-23 03:56
Severity ?
EPSS score ?
Summary
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49113", options: [ { Exploitation: "poc", }, { Automatable: "yes", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-02T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-04-23T03:56:02.133Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-125", description: "CWE-125: Out-of-bounds Read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:39.191Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113", }, ], title: "Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49113", datePublished: "2024-12-10T17:49:45.354Z", dateReserved: "2024-10-11T20:57:49.206Z", dateUpdated: "2025-04-23T03:56:02.133Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49088
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Common Log File System Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49088 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49088", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:52:17.891666Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:02:27.241Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-126", description: "CWE-126: Buffer Over-read", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:36.338Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49088", }, ], title: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49088", datePublished: "2024-12-10T17:49:41.908Z", dateReserved: "2024-10-11T20:57:49.199Z", dateUpdated: "2025-03-11T16:44:36.338Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49090
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Windows Common Log File System Driver Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49090 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows Server 2025 |
Version: 10.0.26100.0 < 10.0.26100.2605 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49090", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:52:14.821718Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:02:45.507Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-822", description: "CWE-822: Untrusted Pointer Dereference", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:36.884Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49090", }, ], title: "Windows Common Log File System Driver Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49090", datePublished: "2024-12-10T17:49:42.500Z", dateReserved: "2024-10-11T20:57:49.200Z", dateUpdated: "2025-03-11T16:44:36.884Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49118
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49118 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Windows 10 Version 1809 |
Version: 10.0.17763.0 < 10.0.17763.6659 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49118", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-13T20:51:40.705689Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-13T21:05:49.921Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1809", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2019 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.6659", status: "affected", version: "10.0.17763.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022", vendor: "Microsoft", versions: [ { lessThan: "10.0.20348.2966", status: "affected", version: "10.0.20348.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "ARM64-based Systems", "x64-based Systems", ], product: "Windows 10 Version 21H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19044.5247", status: "affected", version: "10.0.19043.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22621.4602", status: "affected", version: "10.0.22621.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", "ARM64-based Systems", "32-bit Systems", ], product: "Windows 10 Version 22H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.19045.5247", status: "affected", version: "10.0.19045.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", ], product: "Windows 11 version 22H3", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows 11 Version 23H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.22631.4602", status: "affected", version: "10.0.22631.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2022, 23H2 Edition (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.25398.1308", status: "affected", version: "10.0.25398.0", versionType: "custom", }, ], }, { platforms: [ "ARM64-based Systems", "x64-based Systems", ], product: "Windows 11 Version 24H2", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2025", vendor: "Microsoft", versions: [ { lessThan: "10.0.26100.2605", status: "affected", version: "10.0.26100.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1507", vendor: "Microsoft", versions: [ { lessThan: "10.0.10240.20857", status: "affected", version: "10.0.10240.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows 10 Version 1607", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2016 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "10.0.14393.7606", status: "affected", version: "10.0.14393.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "32-bit Systems", "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 Service Pack 2", vendor: "Microsoft", versions: [ { lessThan: "6.0.6003.23016", status: "affected", version: "6.0.6003.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.1.7601.27467", status: "affected", version: "6.1.7601.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.2.9200.25222", status: "affected", version: "6.2.9200.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, { platforms: [ "x64-based Systems", ], product: "Windows Server 2012 R2 (Server Core installation)", vendor: "Microsoft", versions: [ { lessThan: "6.3.9600.22318", status: "affected", version: "6.3.9600.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.6659", versionStartIncluding: "10.0.17763.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.20348.2966", versionStartIncluding: "10.0.20348.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21H2:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.19044.5247", versionStartIncluding: "10.0.19043.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_22H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22621.4602", versionStartIncluding: "10.0.22621.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.19045.5247", versionStartIncluding: "10.0.19045.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23H2:*:*:*:*:*:*:x64:*", versionEndExcluding: "10.0.22631.4602", versionStartIncluding: "10.0.22631.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.25398.1308", versionStartIncluding: "10.0.25398.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_11_24H2:*:*:*:*:*:*:arm64:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.26100.2605", versionStartIncluding: "10.0.26100.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.10240.20857", versionStartIncluding: "10.0.10240.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.14393.7606", versionStartIncluding: "10.0.14393.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*", versionEndExcluding: "6.0.6003.23016", versionStartIncluding: "6.0.6003.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.1.7601.27467", versionStartIncluding: "6.1.7601.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.2.9200.25222", versionStartIncluding: "6.2.9200.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*", versionEndExcluding: "6.3.9600.22318", versionStartIncluding: "6.3.9600.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-416", description: "CWE-416: Use After Free", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:40.441Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49118", }, ], title: "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49118", datePublished: "2024-12-10T17:49:46.808Z", dateReserved: "2024-10-11T20:57:49.207Z", dateUpdated: "2025-03-11T16:44:40.441Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.