Описание
Windows DNS Server Remote Code Execution Vulnerability
Меры по смягчению последствий
The following mitigating factors may be helpful in your situation:
To be vulnerable, a DNS server would need to have dynamic updates enabled.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 Version 1909 for 32-bit Systems | ||
Windows 10 Version 1909 for x64-based Systems | ||
Windows 10 Version 1909 for ARM64-based Systems | ||
Windows 10 Version 20H2 for 32-bit Systems | ||
Windows 10 Version 20H2 for ARM64-based Systems | ||
Windows Server, version 20H2 (Server Core Installation) | ||
Windows 10 Version 21H1 for x64-based Systems | ||
Windows 10 Version 21H1 for ARM64-based Systems | ||
Windows 10 Version 21H1 for 32-bit Systems | ||
Windows Server 2022 |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
Older Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 87%
0.03234
Низкий
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
Windows DNS Server Remote Code Execution Vulnerability.
CVSS3: 8.8
fstec
больше 3 лет назад
Уязвимость компонента Windows DNS Server операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 87%
0.03234
Низкий
8.8 High
CVSS3