Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-24905

Опубликовано: 09 мая 2023
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

Remote Desktop Client Remote Code Execution Vulnerability

FAQ

According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?

An attacker must send the user a malicious file and convince them to open it.

How could an attacker exploit this vulnerability?

An attacker could host the malicious .rdp file on a file share, a user accessing the .rdp file from the share would be vulnerable to remote code execution.

Обновления

ПродуктСтатьяОбновление
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 10 Version 22H2 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 61%
0.00412
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
около 2 лет назад

Remote Desktop Client Remote Code Execution Vulnerability

CVSS3: 7.8
github
около 2 лет назад

Remote Desktop Client Remote Code Execution Vulnerability

CVSS3: 7.8
fstec
около 2 лет назад

Уязвимость клиента удаленного рабочего стола Remote Desktop Client операционной системы Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 61%
0.00412
Низкий

7.8 High

CVSS3