Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2025-49666

Опубликовано: 08 июл. 2025
Источник: msrc
CVSS3: 7.2
EPSS Низкий

Описание

Windows Server Setup and Boot Event Collection Remote Code Execution Vulnerability

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to execute code over a network.

FAQ

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

To successfully exploit this vulnerability, an attacker or the targeted user would need to achieve a high level of control over a machine, as the attack requires access to processes typically restricted from average users.

Essentially, the exploitation necessitates elevated privileges on the compromised machine due to the requirement of manipulating processes beyond the reach of standard user permissions.

Обновления

ПродуктСтатьяОбновление
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows Server 2022
Windows Server 2022 (Server Core installation)
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows Server 2025
Windows Server 2025 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Unlikely

DOS

N/A

EPSS

Процентиль: 28%
0.00097
Низкий

7.2 High

CVSS3

Связанные уязвимости

CVSS3: 7.2
nvd
26 дней назад

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to execute code over a network.

CVSS3: 7.2
github
26 дней назад

Heap-based buffer overflow in Windows Kernel allows an authorized attacker to execute code over a network.

CVSS3: 7.2
fstec
26 дней назад

Уязвимость функции Setup and Boot Event Collection операционных систем Microsoft Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 28%
0.00097
Низкий

7.2 High

CVSS3