Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2023-36397

Опубликовано: 14 нояб. 2023
Источник: msrc
CVSS3: 9.8
EPSS Низкий

Описание

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

Меры по смягчению последствий

Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation:

The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel.

You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.

FAQ

How could an attacker exploit this vulnerability?

When Windows message queuing service is running in a PGM Server environment, an attacker could send a specially crafted file over the network to achieve remote code execution and attempt to trigger malicious code.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 85%
0.02732
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
больше 1 года назад

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

CVSS3: 9.8
github
больше 1 года назад

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

CVSS3: 9.8
fstec
больше 1 года назад

Уязвимость реализации протокола Pragmatic General Multicast (PGM) операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 85%
0.02732
Низкий

9.8 Critical

CVSS3