Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2022-34718

Опубликовано: 13 сент. 2022
Источник: msrc
CVSS3: 9.8
EPSS Высокий

Описание

Windows TCP/IP Remote Code Execution Vulnerability

Меры по смягчению последствий

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

Only systems with the IKE and AuthIP IPsec Keying Modules running are vulnerable to this attack.

You can run either of the following commands to check the running status of this service:

PS: C:\> Get-Service Ikeext

  • OR

Cmd: C:\> sc query ikeext

This mitigation could have negative affects on your IPSec functionality. Microsoft strongly recommends updating your system with the latest Windows security updates.

FAQ

How could an attacker exploit this vulnerability?

An unauthenticated attacker could send a specially crafted IPv6 packet to a Windows node where IPSec is enabled, which could enable a remote code execution exploitation on that machine.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

Older Software Release

Exploitation More Likely

DOS

N/A

EPSS

Процентиль: 99%
0.84306
Высокий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

Windows TCP/IP Remote Code Execution Vulnerability

CVSS3: 9.8
github
почти 3 года назад

Windows TCP/IP Remote Code Execution Vulnerability.

CVSS3: 9.8
fstec
почти 3 года назад

Уязвимость реализации протокола TCP/IP операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 99%
0.84306
Высокий

9.8 Critical

CVSS3