Описание
Windows Telephony Service Remote Code Execution Vulnerability
FAQ
How could an attacker exploit this vulnerability?
An attacker could exploit this vulnerability by tricking a user into sending a request to a malicious server. This could result in the server returning malicious data that might cause arbitrary code execution on the user's system.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows 10 for 32-bit Systems | ||
Windows 10 for x64-based Systems | ||
Windows Server 2016 | ||
Windows 10 Version 1607 for 32-bit Systems | ||
Windows 10 Version 1607 for x64-based Systems | ||
Windows Server 2016 (Server Core installation) | ||
Windows 10 Version 1809 for 32-bit Systems | ||
Windows 10 Version 1809 for x64-based Systems | ||
Windows Server 2019 | ||
Windows Server 2019 (Server Core installation) |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 63%
0.00453
Низкий
8.8 High
CVSS3
Связанные уязвимости
CVSS3: 8.8
nvd
5 месяцев назад
Windows Telephony Service Remote Code Execution Vulnerability
CVSS3: 8.8
github
5 месяцев назад
Windows Telephony Service Remote Code Execution Vulnerability
CVSS3: 8.8
fstec
5 месяцев назад
Уязвимость службы Telephony Service операционных систем Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 63%
0.00453
Низкий
8.8 High
CVSS3