Описание
Windows Kernel Information Disclosure Vulnerability
Insertion of sensitive information into log file in Windows Kernel allows an unauthorized attacker to disclose information locally.
FAQ
What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is Kernel memory read - unintentional read access to memory contents in kernel space from a user mode process.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Windows Server 2016 | ||
| Windows Server 2016 (Server Core installation) | ||
| Windows Server 2019 | ||
| Windows Server 2019 (Server Core installation) | ||
| Windows Server 2022 | ||
| Windows Server 2022 (Server Core installation) | ||
| Windows Server 2022, 23H2 Edition (Server Core installation) | ||
| Windows Server 2025 | ||
| Windows Server 2025 (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
EPSS
6.2 Medium
CVSS3
Связанные уязвимости
Insertion of sensitive information into log file in Windows Kernel allows an unauthorized attacker to disclose information locally.
Insertion of sensitive information into log file in Windows Kernel allows an unauthorized attacker to disclose information locally.
Уязвимость ядра операционных систем Windows, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
6.2 Medium
CVSS3