Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-43533

Опубликовано: 08 окт. 2024
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Remote Desktop Client Remote Code Execution Vulnerability

Меры по смягчению последствий

The following mitigation may be helpful in your situation. In all cases, Microsoft strongly recommends that you install the updates for this vulnerability as soon as possible even if you plan to leave Remote Desktop Services disabled:

1. Disable Remote Desktop Services if they are not required.

If you no longer need these services on your system, consider disabling them as a security best practice. Disabling unused and unneeded services helps reduce your exposure to security vulnerabilities.

FAQ

How could an attacker exploit this vulnerability?

In the case of a Remote Desktop connection, an attacker with control of a Remote Desktop Server could trigger a remote code execution (RCE) on the RDP client machine when a victim connects to the attacking server with the vulnerable Remote Desktop Client.

Обновления

ПродуктСтатьяОбновление
Remote Desktop client for Windows Desktop
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 11 version 21H2 for x64-based Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 11 Version 23H2 for x64-based Systems
Windows Server 2022, 23H2 Edition (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 87%
0.03423
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
8 месяцев назад

Remote Desktop Client Remote Code Execution Vulnerability

CVSS3: 8.8
github
8 месяцев назад

Remote Desktop Client Remote Code Execution Vulnerability

CVSS3: 8.8
fstec
8 месяцев назад

Уязвимость клиента удаленного рабочего стола Remote Desktop Protocol (RDP) Client операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 87%
0.03423
Низкий

8.8 High

CVSS3