Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-21431

Опубликовано: 12 мар. 2024
Источник: msrc
CVSS3: 7.8
EPSS Низкий

Описание

Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability

FAQ

What kind of security feature could be bypassed by successfully exploiting this vulnerability?

A hypervisor-protected code integrity (HVCI) security feature bypass vulnerability could exist when Windows incorrectly allows certain kernel-mode pages to be marked as Read, Write, Execute (RWX) even with HVCI enabled. To exploit this vulnerability an attacker could run a specially crafted script at administrator level that exploits a signed driver to bypass code integrity protections in Windows.

Обновления

ПродуктСтатьяОбновление
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 11 version 21H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 10 Version 22H2 for x64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 62%
0.00431
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
nvd
больше 1 года назад

Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability

CVSS3: 7.8
github
больше 1 года назад

Hypervisor-Protected Code Integrity (HVCI) Security Feature Bypass Vulnerability

CVSS3: 7.8
fstec
больше 1 года назад

Уязвимость функции защиты целостности кода гипервизором Hypervisor-protected Code Integrity (HVCI) операционной системы Windows, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 62%
0.00431
Низкий

7.8 High

CVSS3