Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2021-24086

Опубликовано: 12 фев. 2021
Источник: msrc
CVSS3: 7.5
EPSS Средний

Описание

Windows TCP/IP Denial of Service Vulnerability

Меры по смягчению последствий

This vulnerability affects all Windows IPv6 deployments, but Windows systems that are ONLY configured with IPv6 link-local addresses are not reachable by remote attackers. IPv6 link-local addresses are not routable on the internet, and an attack would need to originate from the same logical or adjacent network segment.

Обходное решение

1. Set global reassemblylimit to 0

The following command disables packet reassembly. Any out-of-order packets are dropped. Valid scenarios should not exceed more than 50 out-of-order fragments. We recommend testing prior to updating production systems.

Netsh int ipv6 set global reassemblylimit=0

Further netsh guidance can be found at netsh.

Impact of workaround

There is a potential for packet loss when discarding out-of-order packets.

How to undo the workaround

To restore to default setting "267748640":

Netsh int ipv6 set global reassemblylimit=267748640

2. Configure an Edge device, such as a firewall or load balancer, to disallow IPv6 fragmentation. Host based firewalls do not provide sufficient protection.

FAQ

Where can I find more information about this vulnerability?

Please see MSRC Blog regarding the TCP/IP vulnerabilities discussed in CVE-2021-24074, CVE-2021-24086, and CVE-2021-24094.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

Older Software Release

Exploitation More Likely

DOS

N/A

EPSS

Процентиль: 97%
0.37202
Средний

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 4 лет назад

Windows TCP/IP Denial of Service Vulnerability

CVSS3: 7.5
github
около 3 лет назад

Windows TCP/IP Denial of Service Vulnerability

CVSS3: 7.5
fstec
больше 4 лет назад

Уязвимость службы трассировки (Windows Event Tracing) операционной системы Windows, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 9.8
msrc
больше 4 лет назад

Windows TCP/IP Remote Code Execution Vulnerability

CVSS3: 9.8
msrc
больше 4 лет назад

Windows TCP/IP Remote Code Execution Vulnerability

EPSS

Процентиль: 97%
0.37202
Средний

7.5 High

CVSS3