Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-49132

Опубликовано: 10 дек. 2024
Источник: msrc
CVSS3: 8.1
EPSS Низкий

Описание

Windows Remote Desktop Services Remote Code Execution Vulnerability

FAQ

How could an attacker exploit this vulnerability?

An attacker could successfully exploit this vulnerability by connecting to a system with the Remote Desktop Gateway role, triggering the race condition to create a use-after-free scenario, and then leveraging this to execute arbitrary code.

According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?

Successful exploitation of this vulnerability requires an attacker to win a race condition.

Обновления

ПродуктСтатьяОбновление
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 53%
0.00298
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
nvd
6 месяцев назад

Windows Remote Desktop Services Remote Code Execution Vulnerability

CVSS3: 8.1
github
6 месяцев назад

Windows Remote Desktop Services Remote Code Execution Vulnerability

CVSS3: 8.1
fstec
6 месяцев назад

Уязвимость службы удаленного рабочего стола Remote Desktop Services (RDS) операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 53%
0.00298
Низкий

8.1 High

CVSS3