Описание
HTTP Protocol Stack Remote Code Execution Vulnerability
FAQ
How could an attacker exploit this vulnerability?
In most situations, an unauthenticated attacker could send a specially crafted packet to a targeted server utilizing the HTTP Protocol Stack (http.sys) to process packets.
Is this wormable?
Yes. Microsoft recommends prioritizing the patching of affected servers.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 Version 2004 for 32-bit Systems | ||
Windows 10 Version 2004 for ARM64-based Systems | ||
Windows 10 Version 2004 for x64-based Systems | ||
Windows Server, version 2004 (Server Core installation) | ||
Windows 10 Version 20H2 for 32-bit Systems | ||
Windows 10 Version 20H2 for ARM64-based Systems | ||
Windows Server, version 20H2 (Server Core Installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation More Likely
Older Software Release
Exploitation More Likely
DOS
N/A
EPSS
Процентиль: 100%
0.93043
Критический
9.8 Critical
CVSS3
Связанные уязвимости
CVSS3: 9.8
github
около 3 лет назад
HTTP Protocol Stack Remote Code Execution Vulnerability
CVSS3: 9.8
fstec
около 4 лет назад
Уязвимость сетевого стека HTTP Protocol Stack операционных систем Microsoft Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 100%
0.93043
Критический
9.8 Critical
CVSS3