Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-23392

Опубликовано: 14 мар. 2023
Источник: msrc
CVSS3: 9.8
EPSS Низкий

Описание

HTTP Protocol Stack Remote Code Execution Vulnerability

Меры по смягчению последствий

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

A prerequisite for a server to be vulnerable is that the binding has HTTP/3 enabled and the server uses buffered I/O. HTTP/3 support for services is a new feature of Windows Server 2022. Currently, enabling HTTP/3 is done via a registry key as discussed in this article: Enabling HTTP/3 support on Windows Server 2022

FAQ

How could an attacker exploit this vulnerability?

In most situations, an unauthenticated attacker could send a specially crafted packet to a targeted server utilizing the HTTP Protocol Stack (http.sys) to process packets.

Обновления

ПродуктСтатьяОбновление
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 11 version 21H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

DOS

N/A

EPSS

Процентиль: 90%
0.05566
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 2 лет назад

HTTP Protocol Stack Remote Code Execution Vulnerability

CVSS3: 9.8
github
больше 2 лет назад

HTTP Protocol Stack Remote Code Execution Vulnerability

CVSS3: 9.8
fstec
больше 2 лет назад

Уязвимость реализации HTTP-протокола (http.sys) операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 90%
0.05566
Низкий

9.8 Critical

CVSS3