Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-38076

Опубликовано: 09 июл. 2024
Источник: msrc
CVSS3: 9.8
EPSS Низкий

Описание

Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

Меры по смягчению последствий

The following mitigation may be helpful in your situation.

In all cases, Microsoft strongly recommends that you install the updates for this vulnerability as soon as possible even if you plan to leave Remote Desktop Licensing Service disabled:

1. Disable Remote Desktop Licensing Service if is not required.

If you no longer need this service on your system, consider disabling it as a security best practice. Disabling unused and unneeded services helps reduce your exposure to security vulnerabilities.

FAQ

How could an attacker exploit this vulnerability?

An attacker could send a specially crafted packet to a server set up as a Remote Desktop Licensing server, which will cause remote code execution.

Обновления

ПродуктСтатьяОбновление
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 92%
0.08782
Низкий

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
11 месяцев назад

Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

CVSS3: 9.8
github
11 месяцев назад

Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

CVSS3: 9.8
fstec
12 месяцев назад

Уязвимость службы Remote Desktop Licensing Service операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 92%
0.08782
Низкий

9.8 Critical

CVSS3