خانه » CVE-2024-35250

CVE-2024-35250

آسیب‌پذیری افزایش سطح دسترسی در درایور حالت هسته ویندوز

توسط Vulnerbyte_Alerts

چکیده

این آسیب پذیری برخی از پردازش های ناشناخته درایور حالت Kernel-Mode را تحت تأثیر قرار می دهد. ایجاد تغییرات در ورودی منجر به عدم ارجاع pointer غیرقابل اعتماد می شود. امکان حمله به local host وجود دارد.

توضیحات

این آسیب پذیری دردسته CWE-822 قرار دارد. محصول یک مقدار را از یک منبع نامعتبر به دست می آورد، این مقدار را به یک pointer تبدیل می کند و pointer به دست آمده را تغییر می دهد. همچنین این آسیب پذیری به عنوان عاملی شناخته شده است که بر محرمانگی، یکپارچگی و در دسترس بودن تأثیر می گذارد. به نظر می رسد اکسپلویت آین آسیب پذیری آسان باشد و تنها دسترسی  localبرای این حمله مورد نیاز است.

CVSS

Score Severity Version Vector String
7.8 HIGH 3.1 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

لیست محصولات آسیب پذیر

Versions Platforms Product
affected from 10.0.17763.0 before 10.0.17763.5936 32-bit Systems, x64-based Systems Windows 10 Version 1809
affected from 10.0.0 before 10.0.17763.5936 ARM64-based Systems Windows 10 Version 1809
affected from 10.0.17763.0 before 10.0.17763.5936 x64-based Systems Windows Server 2019
affected from 10.0.17763.0 before 10.0.17763.5936 x64-based Systems Windows Server 2019 (Server Core installation)
affected from 10.0.20348.0 before 10.0.20348.2527 x64-based Systems Windows Server 2022
affected from 10.0.0 before 10.0.22000.3019 x64-based Systems, ARM64-based Systems Windows 11 version 21H2
affected from 10.0.19043.0 before 10.0.19044.4529 32-bit Systems, ARM64-based Systems, x64-based Systems Windows 10 Version 21H2
affected from 10.0.22621.0 before 10.0.22621.3737 ARM64-based Systems, x64-based Systems Windows 11 version 22H2
affected from 10.0.19045.0 before 10.0.19045.4529 x64-based Systems, ARM64-based Systems, 32-bit Systems Windows 10 Version 22H2
affected from 10.0.22631.0 before 10.0.22631.3737 ARM64-based Systems Windows 11 version 22H3
affected from 10.0.22631.0 before 10.0.22631.3737 x64-based Systems Windows 11 Version 23H2
affected from 10.0.25398.0 before 10.0.25398.950 x64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation)
affected from 10.0.10240.0 before 10.0.10240.20680 32-bit Systems, x64-based Systems Windows 10 Version 1507
affected from 10.0.14393.0 before 10.0.14393.7070 32-bit Systems, x64-based Systems Windows 10 Version 1607
affected from 10.0.14393.0 before 10.0.14393.7070 x64-based Systems Windows Server 2016
affected from 10.0.14393.0 before 10.0.14393.7070 x64-based Systems Windows Server 2016 (Server Core installation)
affected from 6.0.6003.0 before 6.0.6003.22720 32-bit Systems Windows Server 2008 Service Pack 2
affected from 6.0.6003.0 before 6.0.6003.22720 32-bit Systems, x64-based Systems Windows Server 2008 Service Pack 2 (Server Core installation)
affected from 6.0.6003.0 before 6.0.6003.22720 x64-based Systems Windows Server 2008 Service Pack 2
affected from 6.1.7601.0 before 6.1.7601.27170 x64-based Systems Windows Server 2008 R2 Service Pack 1
affected from 6.1.7601.0 before 6.1.7601.27170 x64-based Systems Windows Server 2008 R2 Service Pack 1 (Server Core installation)
affected from 6.2.9200.0 before 6.2.9200.24919 x64-based Systems Windows Server 2012
affected from 6.2.9200.0 before 6.2.9200.24919 x64-based Systems Windows Server 2012 (Server Core installation)
affected from 6.3.9600.0 before 6.3.9600.22023 x64-based Systems Windows Server 2012 R2
affected from 6.3.9600.0 before 6.3.9600.22023 x64-based Systems Windows Server 2012 R2 (Server Core installation)

 لیست محصولات بروز شده

Product Impact Max Severity Build Number
Windows Server 2012 R2 (Server Core installation) Elevation of Privilege Important 6.3.9600.22023
Windows Server 2012 R2 Elevation of Privilege Important 6.3.9600.22023
Windows Server 2012 (Server Core installation) Elevation of Privilege Important 6.2.9200.24919
Windows Server 2012 Elevation of Privilege Important 6.2.9200.24919
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Elevation of Privilege Important 6.1.7601.27170
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Elevation of Privilege Important 6.1.7601.27170
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Elevation of Privilege Important 6.1.7601.27170
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Elevation of Privilege Important 6.1.7601.27170
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Elevation of Privilege Important 6.0.6003.22720
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Elevation of Privilege Important 6.0.6003.22720
Windows Server 2008 for x64-based Systems Service Pack 2 Elevation of Privilege Important 6.0.6003.22720
Windows Server 2008 for x64-based Systems Service Pack 2 Elevation of Privilege Important 6.0.6003.22720
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Elevation of Privilege Important 6.0.6003.22720
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Elevation of Privilege Important 6.0.6003.22720
Windows Server 2008 for 32-bit Systems Service Pack 2 Elevation of Privilege Important 6.0.6003.22720
Windows Server 2008 for 32-bit Systems Service Pack 2 Elevation of Privilege Important 6.0.6003.22720
Windows Server 2016 (Server Core installation) Elevation of Privilege Important 10.0.14393.7070
Windows Server 2016 Elevation of Privilege Important 10.0.14393.7070
Windows 10 Version 1607 for x64-based Systems Elevation of Privilege Important 10.0.14393.7070
Windows 10 Version 1607 for 32-bit Systems Elevation of Privilege Important 10.0.14393.7070
Windows 10 for x64-based Systems Elevation of Privilege Important 10.0.10240.20680
Windows 10 for 32-bit Systems Elevation of Privilege Important 10.0.10240.20680
Windows Server 2022, 23H2 Edition (Server Core installation) Elevation of Privilege Important 10.0.25398.950
Windows 11 Version 23H2 for x64-based Systems Elevation of Privilege Important 10.0.22631.3737
Windows 11 Version 23H2 for ARM64-based Systems Elevation of Privilege Important 10.0.22631.3737
Windows 10 Version 22H2 for 32-bit Systems Elevation of Privilege Important 10.0.19045.4529
Windows 10 Version 22H2 for ARM64-based Systems Elevation of Privilege Important 10.0.19045.4529
Windows 10 Version 22H2 for x64-based Systems Elevation of Privilege Important 10.0.19045.4529
Windows 11 Version 22H2 for x64-based Systems Elevation of Privilege Important 10.0.22621.3737
Windows 11 Version 22H2 for ARM64-based Systems Elevation of Privilege Important 10.0.22621.3737
Windows 10 Version 21H2 for x64-based Systems Elevation of Privilege Important 10.0.19044.4529
Windows 10 Version 21H2 for ARM64-based Systems Elevation of Privilege Important 10.0.19044.4529
Windows 10 Version 21H2 for 32-bit Systems Elevation of Privilege Important 10.0.19044.4529
Windows 11 version 21H2 for ARM64-based Systems Elevation of Privilege Important 10.0.22000.3019
Windows 11 version 21H2 for x64-based Systems Elevation of Privilege Important 10.0.22000.3019
Windows Server 2022 (Server Core installation) Elevation of Privilege Important 10.0.20348.2527
Windows Server 2022 (Server Core installation) Elevation of Privilege Important 10.0.20348.2522
Windows Server 2022 Elevation of Privilege Important 10.0.20348.2527
Windows Server 2022 Elevation of Privilege Important 10.0.20348.2522
Windows Server 2019 (Server Core installation) Elevation of Privilege Important 10.0.17763.5936
Windows Server 2019 Elevation of Privilege Important 10.0.17763.5936
Windows 10 Version 1809 for ARM64-based Systems Elevation of Privilege Important 10.0.17763.5936
Windows 10 Version 1809 for x64-based Systems Elevation of Privilege Important 10.0.17763.5936
Windows 10 Version 1809 for 32-bit Systems Elevation of Privilege Important 10.0.17763.5936

نتیجه گیری

مهاجمی که با موفقیت از این آسیب‌پذیری سوء استفاده کند، می‌تواند امتیازات SYSTEM را به دست آورد.

برای جلوگیری از هرگونه نفوذ بهتر است از نسخه های بروزرسانی شده استفاده کنید.

منابع

  1. https://www.cve.org/CVERecord?id=CVE-2024-35250
  2. https://www.cvedetails.com/cve/CVE-2024-35250/
  3. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-35250
  4. https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-35250
  5. https:// com/?id.268018
  6. https://github.com/varwara/CVE-2024-35250
  7. https://nvd.nist.gov/vuln/detail/cve-2024-35250
  8. https://cwe.mitre.org/data/definitions/822.html

همچنین ممکن است دوست داشته باشید

پیام بگذارید