Описание
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
FAQ
How could an attacker exploit this vulnerability?
An unauthenticated attacker could send a specially crafted protocol message to a Routing and Remote Access Service (RRAS) server, which could lead to remote code execution (RCE) on the RAS server machine.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
| Windows Server 2008 for x64-based Systems Service Pack 2 | ||
| Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | ||
| Windows Server 2008 R2 for x64-based Systems Service Pack 1 | ||
| Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
| Windows Server 2012 | ||
| Windows Server 2012 (Server Core installation) | ||
| Windows Server 2012 R2 | ||
| Windows Server 2012 R2 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
EPSS
Процентиль: 89%
0.04743
Низкий
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
nvd
больше 1 года назад
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS3: 8.8
github
больше 1 года назад
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS3: 8.8
fstec
больше 1 года назад
Уязвимость службы Windows Routing and Remote Access Service (RRAS) операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 89%
0.04743
Низкий
8.8 High
CVSS3