- شناسه CVE-2024-49105 :CVE
- CWE-284 :CWE
- msrc.microsoft.com :Advisory
- منتشر شده: 12/10/2024
- به روز شده: 01/08/2025
- امتیاز: 8.4
- نوع حمله: T1068
- اثر گذاری: Remote Code Execution
- برند: Microsoft
- محصول: Windows
- وضعیتPublished :CVE
- No :POC
- وضعیت آسیب پذیری: patch شده
چکیده
یک مهاجم احراز هویت شده این آسیب پذیری را به صورت RCE در سرور از طریق اتصال از راه دور به دسکتاپ(Remote Desktop connection)، اکسپلویت کند. از سوی دیگر مهاجم احراز هویت شده با ارسال برنامه مخرب از طریق MMC می تواند guest-to-host RCE را اجرا کند.
این آسیبپذیری میتواند منجر به خروج از سندباکس مرورگر شود.
این حمله به یک کاربر ادمین روی کلاینت نیاز دارد تا به یک سرور مخرب متصل شود و این می تواند به مهاجم اجازه دهد تا اجرای کد از طریق کلاینت را به دست آورد.
توضیحات
این آسیب پذیری به مهاجم اجازه می دهد تا به طور بالقوه کد دلخواه را از طریق Remote Desktop Client بر روی یک سیستم هدف اجرا کند. بردار حمله مبتنی بر شبکه است، با پیچیدگی حمله کم، اما به امتیازات بالا و تعامل کاربر نیاز دارد. یک مهاجم می تواند کد دلخواه را روی سیستم هدف اجرا کند و به طور بالقوه کنترل ماشین آسیب دیده را به دست می آورد. این تأثیر از نظر محرمانه بودن، یکپارچگی و در دسترس بودن بهعنوان «بالا» رتبهبندی میشود، که نشان میدهد مهاجم میتواند به طور بالقوه به اطلاعات حساس دسترسی داشته باشد، دادههای سیستم را اصلاح کند و عملکرد عادی سیستم آسیبدیده را مختل کند.
CVSS
Score | Severity | Version | Vector String | ||
8.4 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C |
لیست محصولات آسیب پذیر
version | platform | product |
affected from 10.0.17763.0 before 10.0.17763.6659 | 32-bit Systems, x64-based Systems | Windows 10 Version 1809 |
affected from 10.0.17763.0 before 10.0.17763.6659 | x64-based Systems | Windows Server 2019 |
affected from 10.0.17763.0 before 10.0.17763.6659 | x64-based Systems | Windows Server 2019 (Server Core installation) |
affected from 1.2.0.0 before 1.2.5716.0 | Unknown | Remote Desktop client for Windows Desktop |
affected from 10.0.20348.0 before 10.0.20348.2966 | x64-based Systems | Windows Server 2022 |
affected from 10.0.19043.0 before 10.0.19044.5247 | 32-bit Systems, ARM64-based Systems, x64-based Systems | Windows 10 Version 21H2 |
affected from 10.0.22621.0 before 10.0.22621.4602 | ARM64-based Systems, x64-based Systems | Windows 11 version 22H2 |
affected from 10.0.19045.0 before 10.0.19045.5247 | x64-based Systems, ARM64-based Systems, 32-bit Systems | Windows 10 Version 22H2 |
affected from 10.0.26100.0 before 10.0.26100.2605 | x64-based Systems | Windows Server 2025 (Server Core installation) |
affected from 10.0.22631.0 before 10.0.22631.4602 | ARM64-based Systems | Windows 11 version 22H3 |
affected from 10.0.22631.0 before 10.0.22631.4602 | x64-based Systems | Windows 11 Version 23H2 |
affected from 10.0.25398.0 before 10.0.25398.1308 | x64-based Systems | Windows Server 2022, 23H2 Edition (Server Core installation) |
affected from 10.0.26100.0 before 10.0.26100.2605 | ARM64-based Systems, x64-based Systems | Windows 11 Version 24H2 |
affected from 10.0.26100.0 before 10.0.26100.2605 | x64-based Systems | Windows Server 2025 |
affected from 10.0.10240.0 before 10.0.10240.20857 | 32-bit Systems, x64-based Systems | Windows 10 Version 1507 |
affected from 10.0.14393.0 before 10.0.14393.7606 | 32-bit Systems, x64-based Systems | Windows 10 Version 1607 |
affected from 10.0.14393.0 before 10.0.14393.7606 | x64-based Systems | Windows Server 2016 |
affected from 10.0.14393.0 before 10.0.14393.7606 | x64-based Systems | Windows Server 2016 (Server Core installation) |
affected from 6.1.7601.0 before 6.1.7601.27467 | x64-based Systems | Windows Server 2008 R2 Service Pack 1 |
affected from 6.1.7601.0 before 6.1.7601.27467 | x64-based Systems | Windows Server 2008 R2 Service Pack 1 (Server Core installation) |
affected from 6.2.9200.0 before 6.2.9200.25222 | x64-based Systems | Windows Server 2012 |
affected from 6.2.9200.0 before 6.2.9200.25222 | x64-based Systems | Windows Server 2012 (Server Core installation) |
affected from 6.3.9600.0 before 6.3.9600.22318 | x64-based Systems | Windows Server 2012 R2 |
affected from 6.3.9600.0 before 6.3.9600.22318 | x64-based Systems | Windows Server 2012 R2 (Server Core installation) |
affected from 1.00 before 2.0.327.0 | Unknown | Windows App Client for Windows Desktop |
لیست محصولات بروز شده
Build number | Max severity | impact | product |
2.0.327.0 | Critical | Remote Code Execution | Windows App Client for Windows Desktop |
6.3.9600.22318 | Critical | Remote Code Execution | Windows Server 2012 R2 (Server Core installation) |
6.3.9600.22318 | Critical | Remote Code Execution | Windows Server 2012 R2 |
6.2.9200.25222 | Critical | Remote Code Execution | Windows Server 2012 (Server Core installation) |
6.2.9200.25222 | Critical | Remote Code Execution | Windows Server 2012 |
6.1.7601.27467
6.1.7601.27467 |
Critical | Remote Code Execution |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) |
6.1.7601.27467
6.1.7601.27467 |
Critical | Remote Code Execution | Windows Server 2008 R2 for x64-based Systems Service Pack 1 |
10.0.14393.7606 | Critical | Remote Code Execution | Windows Server 2016 (Server Core installation) |
10.0.14393.7606 | Critical | Remote Code Execution | Windows Server 2016 |
10.0.14393.7606 | Critical | Remote Code Execution | Windows 10 Version 1607 for x64-based Systems |
10.0.14393.7606 | Critical | Remote Code Execution | Windows 10 Version 1607 for 32-bit Systems |
10.0.10240.20857 | Critical | Remote Code Execution | Windows 10 Version 1607 for 32-bit Systems |
10.0.10240.20857 | Critical | Remote Code Execution | Windows 10 for 32-bit Systems |
10.0.26100.2605
10.0.26100.2528 |
Critical | Remote Code Execution | Windows Server 2025 |
10.0.26100.2605
10.0.26100.2528 |
Critical | Remote Code Execution | Windows 11 Version 24H2 for x64-based Systems |
10.0.26100.2605
10.0.26100.2528 |
Critical | Remote Code Execution | Windows 11 Version 24H2 for ARM64-based Systems |
10.0.25398.1308 | Critical | Remote Code Execution | Windows Server 2022, 23H2 Edition (Server Core installation) |
10.0.22631.4602 | Critical | Remote Code Execution | Windows 11 Version 23H2 for x64-based Systems |
10.0.22631.4602 | Critical | Remote Code Execution | Windows 11 Version 23H2 for ARM64-based Systems |
10.0.26100.2605
10.0.26100.2528 |
Critical | Remote Code Execution | Windows Server 2025 (Server Core installation) |
10.0.19045.5247 | Critical | Remote Code Execution | Windows 10 Version 22H2 for 32-bit Systems |
10.0.19045.5247 | Critical | Remote Code Execution | Windows 10 Version 22H2 for ARM64-based Systems |
10.0.19045.5247 | Critical | Remote Code Execution | Windows 10 Version 22H2 for x64-based Systems |
10.0.22621.4602 | Critical | Remote Code Execution | Windows 11 Version 22H2 for x64-based Systems |
10.0.22621.4602 | Critical | Remote Code Execution | Windows 11 Version 22H2 for ARM64-based Systems |
10.0.19044.5247 | Critical | Remote Code Execution | Windows 10 Version 21H2 for x64-based Systems |
10.0.19044.5247 | Critical | Remote Code Execution | Windows 10 Version 21H2 for ARM64-based Systems |
10.0.19044.5247 | Critical | Remote Code Execution | Windows 10 Version 21H2 for 32-bit Systems |
10.0.20348.2966
10.0.20348.2908 |
Critical | Remote Code Execution | Windows Server 2022 (Server Core installation) |
10.0.20348.2966
10.0.20348.2908 |
Critical | Remote Code Execution | Windows Server 2022 |
1.2.5716.0 | Critical | Remote Code Execution | Remote Desktop client for Windows Desktop |
10.0.17763.6659 | Critical | Remote Code Execution | Windows Server 2019 (Server Core installation) |
10.0.17763.6659 | Critical | Remote Code Execution | Windows Server 2019 |
10.0.17763.6659 | Critical | Remote Code Execution | Windows 10 Version 1809 for x64-based Systems |
10.0.17763.6659 | Critical | Remote Code Execution | Windows 10 Version 1809 for 32-bit Systems |
نتیجه گیری
برای جلوگیری از نفوذ افراد مهاجم از طریق این آسیب پذیری بهتر است از نسخه های بروزرسانی شده که توسط شرکت ماکروسافت بیان شده است استفاده کنید.