Описание
Windows TCP/IP Denial of Service Vulnerability
Меры по смягчению последствий
The following mitigating factors might be helpful in your situation:
This vulnerability requires a non-default firewall setting of EnablePacketQueue. With the default configuration of EnablePacketQueue as Not configured (none), systems are not vulnerable. This setting can be set through Intune/MDM or a group policy setting. EnablePacketQueue is an Intune Endpoint Protection feature, but also a standard firewall feature. For more information, see Firewall CSP.
Обновления
| Продукт | Статья | Обновление | 
|---|---|---|
| Windows 10 Version 1809 for 32-bit Systems | ||
| Windows 10 Version 1809 for x64-based Systems | ||
| Windows 10 Version 1809 for ARM64-based Systems | ||
| Windows Server 2019 | ||
| Windows Server 2019 (Server Core installation) | ||
| Windows Server 2022 | ||
| Windows Server 2022 (Server Core installation) | ||
| Windows 11 version 21H2 for x64-based Systems | ||
| Windows 11 version 21H2 for ARM64-based Systems | ||
| Windows 10 Version 21H2 for 32-bit Systems | 
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 88%
0.03748
Низкий
7.5 High
CVSS3
Связанные уязвимости
CVSS3: 7.5
fstec
около 2 лет назад
Уязвимость реализации протокола TCP/IP операционной системы Windows, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
Процентиль: 88%
0.03748
Низкий
7.5 High
CVSS3