Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-21291

Опубликовано: 14 янв. 2025
Источник: msrc
CVSS3: 8.8
EPSS Низкий

Описание

Windows Direct Show Remote Code Execution Vulnerability

FAQ

According to the CVSS metric, the attack vector is network (AV:N) and the user interaction is required (UI:R). What is the target context of the remote code execution?

This attack requires an authenticated client to click a link so that an unauthenticated attacker can initiate remote code execution.

How could an attacker exploit the vulnerability?

An attacker could exploit the vulnerability by controlling subsequent memory allocation after a double free error occurs. This could potentially allow the attacker to execute arbitrary code, leading to remote code execution.

Обновления

ПродуктСтатьяОбновление
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows 10 Version 21H2 for 32-bit Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

EPSS

Процентиль: 82%
0.01654
Низкий

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
nvd
около 1 года назад

Windows Direct Show Remote Code Execution Vulnerability

CVSS3: 8.8
github
около 1 года назад

Windows Direct Show Remote Code Execution Vulnerability

CVSS3: 8.8
fstec
около 1 года назад

Уязвимость компонента Direct Show Remote операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 82%
0.01654
Низкий

8.8 High

CVSS3