Описание
Windows USB Generic Parent Driver Remote Code Execution Vulnerability
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to prepare the target environment to improve exploit reliability.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 Version 1809 for 32-bit Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows 10 Version 1809 for ARM64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) | ||
Windows Server 2022 | ||
Windows Server 2022 (Server Core installation) | ||
Windows 11 version 21H2 for x64-based Systems | ||
Windows 11 version 21H2 for ARM64-based Systems | ||
Windows 10 Version 21H2 for 32-bit Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 32%
0.00123
Низкий
6.4 Medium
CVSS3
Связанные уязвимости
CVSS3: 6.4
nvd
больше 1 года назад
Windows USB Generic Parent Driver Remote Code Execution Vulnerability
CVSS3: 6.4
github
больше 1 года назад
Windows USB Generic Parent Driver Remote Code Execution Vulnerability
CVSS3: 6.4
fstec
больше 1 года назад
Уязвимость универсального драйвера USB (USB Generic Parent) операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 32%
0.00123
Низкий
6.4 Medium
CVSS3