Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-29347

Опубликовано: 11 июл. 2023
Источник: msrc
CVSS3: 8.7
EPSS Низкий

Описание

Windows Admin Center Spoofing Vulnerability

FAQ

Where can customer obtain the updated software?

Customers can download the latest build of Windows Admin Center by using this link: aka.ms/downloadwac

According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

The vulnerability is in the web server, but the malicious scripts execute in the victim’s browser on their machine.

How could an attacker exploit this vulnerability?

An authenticated attacker could exploit the vulnerability by carrying out any one of the following actions:

  1. Importing a malicious script to the Windows Admin Center (WAC) HTML form.
  2. Importing a .csv file using the Windows Admin Center (WAC) user interface.
  3. Importing a .csv file using the Windows Admin Center (WAC) API.

If the victim who triggers the attack is a highly-privileged administrator the injected scripts could perform operations on the WAC server, thus spoofing the WAC application with the privileges of the victim administrator.

Обновления

ПродуктСтатьяОбновление
Windows Admin Center

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

Older Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 56%
0.00337
Низкий

8.7 High

CVSS3

Связанные уязвимости

CVSS3: 8.7
nvd
больше 2 лет назад

Windows Admin Center Spoofing Vulnerability

CVSS3: 8.7
github
больше 2 лет назад

Windows Admin Center Spoofing Vulnerability

CVSS3: 8.7
fstec
больше 2 лет назад

Уязвимость средства управления серверами Windows Admin Center (WAC), связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки

EPSS

Процентиль: 56%
0.00337
Низкий

8.7 High

CVSS3