Описание
Windows TCP/IP Denial of Service Vulnerability
Меры по смягчению последствий
The following mitigating factors might be helpful in your situation:
This vulnerability requires a non-default firewall setting of EnablePacketQueue. With the default configuration of EnablePacketQueue as Not configured (none), systems are not vulnerable. This setting can be set through Intune/MDM or a group policy setting. EnablePacketQueue is an Intune Endpoint Protection feature, but also a standard firewall feature. For more information, see Firewall CSP.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 Version 1809 for 32-bit Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows 10 Version 1809 for ARM64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) | ||
Windows 11 version 21H2 for x64-based Systems | ||
Windows 11 version 21H2 for ARM64-based Systems | ||
Windows 10 Version 21H2 for 32-bit Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 88%
0.03748
Низкий
7.5 High
CVSS3
Связанные уязвимости
CVSS3: 7.5
fstec
почти 2 года назад
Уязвимость реализации протокола TCP/IP операционной системы Windows, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
Процентиль: 88%
0.03748
Низкий
7.5 High
CVSS3