Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-21307

Опубликовано: 09 янв. 2024
Источник: msrc
CVSS3: 7.5
EPSS Низкий

Описание

Remote Desktop Client Remote Code Execution Vulnerability

FAQ

According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N). What does that mean for this vulnerability?

An unauthorized attacker must wait for a user to initiate a connection.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.

Обновления

ПродуктСтатьяОбновление
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation More Likely

DOS

N/A

EPSS

Процентиль: 41%
0.0019
Низкий

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
nvd
больше 1 года назад

Remote Desktop Client Remote Code Execution Vulnerability

CVSS3: 7.5
github
больше 1 года назад

Remote Desktop Client Remote Code Execution Vulnerability

CVSS3: 7.5
fstec
больше 1 года назад

Уязвимость протокола Remote Desktop Protocol (RDP) операционной системы Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 41%
0.0019
Низкий

7.5 High

CVSS3