Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-21803

Опубликовано: 14 фев. 2023
Источник: msrc
CVSS3: 9.8
EPSS Низкий

Описание

Windows iSCSI Discovery Service Remote Code Execution Vulnerability

Меры по смягчению последствий

The following mitigating factors may be helpful in your situation:

By default the iSCSI Initiator client application is disabled, in this state an attacker cannot exploit this vulnerability. For a system to be vulnerable, the iSCSI Initiator client application would need to be enabled.

FAQ

How could an attacker exploit the vulnerability?

An attacker could exploit the vulnerability by sending a specially crafted malicious DHCP discovery request to the iSCSI Discovery Service on 32-bit machines. An attacker who successfully exploited the vulnerability could then gain the ability to execute code on the target system.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 22H2 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 86%
0.02927
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 2 лет назад

Windows iSCSI Discovery Service Remote Code Execution Vulnerability

CVSS3: 9.8
github
больше 2 лет назад

Windows iSCSI Discovery Service Remote Code Execution Vulnerability

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость службы Windows iSCSI Discovery Service операционной системы Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 86%
0.02927
Низкий

9.8 Critical

CVSS3