خانه » CVE-2024-43572

CVE-2024-43572

آسیب‌پذیری اجرای کد از راه دور(به صورت ریموت) در Microsoft Management Console

توسط Vulnerbyte_Alerts

چکیده

این آسیب پذیری بخش ناشناخته ای از کنسول مدیریت در ویندوز را تحت تأثیر قرار می دهد. امکان شروع حمله از راه دور با استفاده از این آسیب پذیری وجود دارد.

توضیحات

برخی از پردازش های ناشناخته کنسول مدیریت تحت تأثیر این آسیب پذیری قرار می گیرد. این آسیب پذیری در دسته  CWE-707 طبقه بندی می شود. محصول اطمینان نمی‌دهد یا به اشتباه تضمین نمی‌کند که پیام‌ها یا داده‌های ساختاریافته به خوبی شکل گرفته‌ باشند و ویژگی‌های امنیتی خاصی قبل از خواندن از یک بخش بالادستی یا ارسال به یک جزء پایین‌دستی را در نظر بگیرد. در اثر این آسیب پذیری محرمانه بودن، یکپارچگی و در دسترس بودن تحت تأثیر قرار می گیرد.

CVSS

Score Severity Version Vector String
7.8 HIGH 3.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

لیست محصولات آسیب پذیر

Versions Platforms Product
affected from 10.0.17763.0 before 10.0.17763.6414 32-bit Systems, x64-based Systems Windows 10 Version 1809
affected from 10.0.17763.0 before 10.0.17763.6414 x64-based Systems Windows Server 2019
affected from 10.0.17763.0 before 10.0.17763.6414 x64-based Systems Windows Server 2019 (Server Core installation)
affected from 10.0.20348.0 before 10.0.20348..2762 x64-based Systems Windows Server 2022
affected from 10.0.0 before 10.0.22000.3260 x64-based Systems, ARM64-based Systems Windows 11 version 21H2
affected from 10.0.19043.0 before 10.0.19044.5011 32-bit Systems, ARM64-based Systems, x64-based Systems Windows 10 Version 21H2
affected from 10.0.22621.0 before 10.0.22621.4317 ARM64-based Systems, x64-based Systems Windows 11 version 22H2
affected from 10.0.19045.0 before 10.0.19045.5011 x64-based Systems, ARM64-based Systems, 32-bit Systems Windows 10 Version 22H2
affected from 10.0.22631.0 before 10.0.22631.4317 ARM64-based Systems Windows 11 version 22H3
affected from 10.0.22631.0 before 10.0.22631.4317 x64-based Systems Windows 11 Version 23H2
affected from 10.0.25398.0 before 10.0.25398.1189 x64-based Systems Windows Server 2022, 23H2 Edition (Server Core installation)
affected from 10.0.26100.0 before 10.0.26100.2033 ARM64-based Systems, x64-based Systems Windows 11 Version 24H2
affected from 10.0.10240.0 before 10.0.10240.20796 32-bit Systems, x64-based Systems Windows 10 Version 1507
affected from 10.0.14393.0 before 10.0.14393.7428 32-bit Systems, x64-based Systems Windows 10 Version 1607
affected from 10.0.14393.0 before 10.0.14393.7428 x64-based Systems Windows Server 2016
affected from 10.0.14393.0 before 10.0.14393.7428 x64-based Systems Windows Server 2016 (Server Core installation)
affected from 6.0.6003.0 before 6.0.6003.22918 32-bit Systems Windows Server 2008 Service Pack 2
affected from 6.0.6003.0 before 6.0.6003.22918 32-bit Systems, x64-based Systems Windows Server 2008 Service Pack 2 (Server Core installation)
affected from 6.0.6003.0 before 6.0.6003.22918 x64-based Systems Windows Server 2008 Service Pack 2
affected from 6.1.7601.0 before 6.1.7601.27366 x64-based Systems Windows Server 2008 R2 Service Pack 1
affected from 6.1.7601.0 before 6.1.7601.27366 x64-based Systems Windows Server 2008 R2 Service Pack 1 (Server Core installation)
affected from 6.2.9200.0 before 6.2.9200.25118 x64-based Systems Windows Server 2012
affected from 6.2.9200.0 before 6.2.9200.25118 x64-based Systems Windows Server 2012 (Server Core installation)
affected from 6.3.9600.0 before 6.3.9600.22221 x64-based Systems Windows Server 2012 R2
affected from 6.3.9600.0 before 6.3.9600.22221 x64-based Systems Windows Server 2012 R2 (Server Core installation)

 لیست محصولات بروز شده

Product Impact Max Severity Build Number
Windows Server 2012 R2 (Server Core installation) Remote Code Execution Important 6.3.9600.22221
Windows Server 2012 R2 Remote Code Execution Important 6.3.9600.22221
Windows Server 2012 (Server Core installation) Remote Code Execution Important 6.2.9200.25118
Windows Server 2012 Remote Code Execution Important 6.2.9200.25118
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Important 6.1.7601.27366
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Important 6.1.7601.27366
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Important 6.1.7601.27366
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Important 6.1.7601.27366
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22918
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22918
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22918
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22918
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22918
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Important 6.0.6003.22918
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22918
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Important 6.0.6003.22918
Windows Server 2016 (Server Core installation) Remote Code Execution Important 10.0.14393.7428
Windows Server 2016 Remote Code Execution Important 10.0.14393.7428
Windows 10 Version 1607 for x64-based Systems Remote Code Execution Important 10.0.14393.7428
Windows 10 Version 1607 for 32-bit Systems Remote Code Execution Important 10.0.14393.7428
Windows 10 for x64-based Systems Remote Code Execution Important 10.0.10240.20796
Windows 10 for 32-bit Systems Remote Code Execution Important 10.0.10240.20796
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Important 10.0.26100.2033
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Important 10.0.26100.2033
Windows Server 2022, 23H2 Edition (Server Core installation) Remote Code Execution Important 10.0.25398.1189
Windows 11 Version 23H2 for x64-based Systems Remote Code Execution Important 10.0.22631.4317
Windows 11 Version 23H2 for ARM64-based Systems Remote Code Execution Important 10.0.22631.4317
Windows 10 Version 22H2 for 32-bit Systems Remote Code Execution Important 10.0.19045.5011
Windows 10 Version 22H2 for ARM64-based Systems Remote Code Execution Important 10.0.19045.5011
Windows 10 Version 22H2 for x64-based Systems Remote Code Execution Important 10.0.19045.5011
Windows 11 Version 22H2 for x64-based Systems Remote Code Execution Important 10.0.22621.4317
Windows 11 Version 22H2 for ARM64-based Systems Remote Code Execution Important 10.0.22621.4317
Windows 10 Version 21H2 for x64-based Systems Remote Code Execution Important 10.0.19044.5011
Windows 10 Version 21H2 for ARM64-based Systems Remote Code Execution Important 10.0.19044.5011
Windows 10 Version 21H2 for 32-bit Systems Remote Code Execution Important 10.0.19044.5011
Windows 11 version 21H2 for ARM64-based Systems Remote Code Execution Important 10.0.22000.3260
Windows 11 version 21H2 for x64-based Systems Remote Code Execution Important 10.0.22000.3260
Windows Server 2022 (Server Core installation) Remote Code Execution Important 10.0.20348..2762
Windows Server 2022 Remote Code Execution Important 10.0.20348..2762
Windows Server 2019 (Server Core installation) Remote Code Execution Important 10.0.17763.6414
Windows Server 2019 Remote Code Execution Important 10.0.17763.6414
Windows 10 Version 1809 for x64-based Systems Remote Code Execution Important 10.0.17763.6414
Windows 10 Version 1809 for 32-bit Systems Remote Code Execution Important 10.0.17763.6414

 نتیجه گیری

اکسپلویت این آسیب پذیری آسان بوده و حمله ممکن است از راه دور انجام شود. هیچ شکلی از احراز هویت برای اکسپلویت لازم نیست همچنین اکسپلویت موفقیت آمیز مستلزم تعامل کاربر توسط قربانی است. برای جلوگیری از نفوذ مهاجمان بهتر است از نسخه های بروزرسانی شده استفاده کنید.

 منابع

  1. https://www.cve.org/CVERecord?id=CVE-2024-43572
  2. https://www.cvedetails.com/cve/CVE-2024-43572/
  3. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43572
  4. https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-43572
  5. https://vuldb.com/?id.279740
  6. https://nvd.nist.gov/vuln/detail/cve-2024-43572
  7. https://cwe.mitre.org/data/definitions/707.html

همچنین ممکن است دوست داشته باشید

پیام بگذارید