Описание
Windows Update Stack Elevation of Privilege Vulnerability
FAQ
What is the attack vector for this vulnerability?
To exploit this vulnerability, an attacker would need to launch a machine-in-the-middle (MITM) attack against the traffic passing between a domain controller and the target machine.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
| Windows Server 2008 for x64-based Systems Service Pack 2 | ||
| Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
| Windows 7 for 32-bit Systems Service Pack 1 | ||
| Windows 7 for x64-based Systems Service Pack 1 | ||
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
| Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
| Windows Server 2012 | ||
| Windows Server 2012 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 82%
0.01689
Низкий
7.5 High
CVSS3
Связанные уязвимости
CVSS3: 7.5
nvd
почти 5 лет назад
Windows Update Stack Elevation of Privilege Vulnerability
CVSS3: 7.5
github
больше 3 лет назад
Windows Update Stack Elevation of Privilege Vulnerability
CVSS3: 7.5
fstec
почти 5 лет назад
Уязвимость компонента Windows Update Stack операционных систем Windows, позволяющая нарушителю повысить свои привилегии
EPSS
Процентиль: 82%
0.01689
Низкий
7.5 High
CVSS3