خانه » CVE-2025-21307

CVE-2025-21307

آسیب پذیری اجرای کد از راه دور RMCAST( (Reliable Multicast Transport Driverدر ویندوز

توسط Vulnerbyte_Alerts

چکیده

این بخش ناشناخته ای از درایور RMCAST را تحت تأثیر قرار می دهد. ایجاد تغییرات در ورودی منجر به Use After Free می شود. امکان شروع حمله از طریق این آسیب پذیری از راه دور وجود دارد.

توضیحات

این آسیب پذیری در دسته CWE-416 طبقه بندی می شود. ارجاع به حافظه پس از آزاد شدن آن می تواند باعث از کار افتادن برنامه، استفاده از مقادیر غیرمنتظره یا اجرای کد شود. محرمانه بودن، یکپارچگی و در دسترس بودن از بابت این آسیب پذیری تحت تاثیر قرار می گیرد. اکسپلویت این آسیب پذیری آسان است و هیچ شکلی از احراز هویت برای اکسپلویت لازم نیست.

یک مهاجم احراز هویت نشده می‌تواند با ارسال بسته‌های ساخته‌شده ویژه به سوکت باز Windows Pragmatic General Multicast (PGM) روی سرور، بدون هیچ گونه تعاملی از جانب کاربر، از این آسیب‌پذیری سوء استفاده کند.

اسکنر آسیب پذیری Nessus افزونه ای با شناسه 214135 (KB5050048: Windows Server 2012 R2 Security Update (ژانویه 2025)) ارائه می دهد که به تعیین وجود نقص در یک محیط هدف کمک می کند.

CVSS

Score Severity Version Vector String
9.8 CRITICAL 3.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

 لیست محصولات آسیب پذیر

Versions Platforms Product
affected from 10.0.17763.0 before 10.0.17763.6775 32-bit Systems, x64-based Systems

 

Windows 10 Version 1809

 

affected from 10.0.17763.0 before 10.0.17763.6775 x64-based Systems

 

Windows Server 2019

 

affected from 10.0.17763.0 before 10.0.17763.6775 x64-based Systems

 

Windows Server 2019 (Server Core installation)

 

affected from 10.0.20348.0 before 10.0.20348.3091 x64-based Systems

 

Windows Server 2022

 

affected from 10.0.19043.0 before 10.0.19044.5371 32-bit Systems, ARM64-based Systems, x64-based Systems

 

Windows 10 Version 21H2

 

affected from 10.0.22621.0 before 10.0.22621.4751 ARM64-based Systems, x64-based Systems

 

Windows 11 version 22H2

 

affected from 10.0.19045.0 before 10.0.19045.5371 x64-based Systems, ARM64-based Systems, 32-bit Systems

 

Windows 10 Version 22H2

 

affected from 10.0.26100.0 before 10.0.26100.2894 x64-based Systems

 

Windows Server 2025 (Server Core installation)

 

affected from 10.0.22631.0 before 10.0.22631.4751 ARM64-based Systems

 

Windows 11 version 22H3

 

affected from 10.0.22631.0 before 10.0.22631.4751 x64-based Systems

 

Windows 11 Version 23H2

 

affected from 10.0.25398.0 before 10.0.25398.1369 x64-based Systems

 

Windows Server 2022, 23H2 Edition (Server Core installation)

 

affected from 10.0.26100.0 before 10.0.26100.2894 ARM64-based Systems, x64-based Systems

 

Windows 11 Version 24H2

 

affected from 10.0.26100.0 before 10.0.26100.2894 x64-based Systems

 

Windows Server 2025

 

affected from 10.0.10240.0 before 10.0.10240.20890 32-bit Systems, x64-based Systems

 

Windows 10 Version 1507

 

affected from 10.0.14393.0 before 10.0.14393.7699 32-bit Systems, x64-based Systems

 

Windows 10 Version 1607

 

affected from 10.0.14393.0 before 10.0.14393.7699 x64-based Systems

 

Windows Server 2016

 

affected from 10.0.14393.0 before 10.0.14393.7699 x64-based Systems

 

Windows Server 2016 (Server Core installation)

 

affected from 6.0.6003.0 before 6.0.6003.23070 32-bit Systems

 

Windows Server 2008 Service Pack 2

 

affected from 6.0.6003.0 before 6.0.6003.23070 32-bit Systems, x64-based Systems

 

Windows Server 2008 Service Pack 2 (Server Core installation)

 

affected from 6.0.6003.0 before 6.0.6003.23070 x64-based Systems

 

Windows Server 2008 Service Pack 2

 

affected from 6.1.7601.0 before 6.1.7601.27520 x64-based Systems

 

Windows Server 2008 R2 Service Pack 1

 

affected from 6.1.7601.0 before 6.1.7601.27520 x64-based Systems

 

Windows Server 2008 R2 Service Pack 1 (Server Core installation)

 

affected from 6.2.9200.0 before 6.2.9200.25273 x64-based Systems

 

Windows Server 2012

 

affected from 6.2.9200.0 before 6.2.9200.25273 x64-based Systems

 

Windows Server 2012 (Server Core installation)

 

affected from 6.3.9600.0 before 6.3.9600.22371 x64-based Systems

 

Windows Server 2012 R2

 

affected from 6.3.9600.0 before 6.3.9600.22371 x64-based Systems

 

Windows Server 2012 R2 (Server Core installation)

 

 لیست محصولات بروز شده

Product Impact Max Severity Build Number
Windows 10 Version 1607 for 32-bit Systems Remote Code Execution Critical 10.0.14393.7699
Windows 10 for x64-based Systems Remote Code Execution Critical 10.0.10240.20890
Windows 10 for 32-bit Systems Remote Code Execution Critical 10.0.10240.20890
Windows Server 2025 Remote Code Execution Critical 10.0.26100.2894
Windows 11 Version 24H2 for x64-based Systems Remote Code Execution Critical 10.0.26100.2894
Windows Server 2012 R2 (Server Core installation) Remote Code Execution Critical 6.3.9600.22371
Windows Server 2012 R2 Remote Code Execution Critical 6.3.9600.22371
Windows Server 2012 (Server Core installation) Remote Code Execution Critical 6.2.9200.25273
Windows Server 2012 Remote Code Execution Critical 6.2.9200.25273
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Critical 6.1.7601.27520
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Remote Code Execution Critical 6.1.7601.27520
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Critical 6.1.7601.27520
Windows Server 2008 R2 for x64-based Systems Service Pack 1 Remote Code Execution Critical 6.1.7601.27520
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Critical 6.0.6003.23070
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) Remote Code Execution Critical 6.0.6003.23070
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Critical 6.0.6003.23070
Windows Server 2008 for x64-based Systems Service Pack 2 Remote Code Execution Critical 6.0.6003.23070
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Critical 6.0.6003.23070
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) Remote Code Execution Critical 6.0.6003.23070
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Critical 6.0.6003.23070
Windows Server 2008 for 32-bit Systems Service Pack 2 Remote Code Execution Critical 6.0.6003.23070
Windows Server 2016 (Server Core installation) Remote Code Execution Critical 10.0.14393.7699
Windows Server 2016 Remote Code Execution Critical 10.0.14393.7699
Windows 10 Version 1607 for x64-based Systems Remote Code Execution Critical 10.0.14393.7699
Windows 11 Version 24H2 for ARM64-based Systems Remote Code Execution Critical 10.0.26100.2894
Windows Server 2022, 23H2 Edition (Server Core installation) Remote Code Execution Critical 10.0.25398.1369
Windows 11 Version 23H2 for x64-based Systems Remote Code Execution Critical 10.0.22631.4751
Windows 11 Version 23H2 for ARM64-based Systems Remote Code Execution Critical 10.0.22631.4751
Windows Server 2025 (Server Core installation) Remote Code Execution Critical 10.0.26100.2894
Windows 10 Version 22H2 for 32-bit Systems Remote Code Execution Critical 10.0.19045.5371
Windows 10 Version 22H2 for ARM64-based Systems Remote Code Execution Critical 10.0.19045.5371
Windows 10 Version 22H2 for x64-based Systems Remote Code Execution Critical 10.0.19045.5371
Windows 11 Version 22H2 for x64-based Systems Remote Code Execution Critical 10.0.22621.4751
Windows 11 Version 22H2 for ARM64-based Systems Remote Code Execution Critical 10.0.22621.4751
Windows 10 Version 21H2 for x64-based Systems Remote Code Execution Critical 10.0.19044.5371
Windows 10 Version 21H2 for ARM64-based Systems Remote Code Execution Critical 10.0.19044.5371
Windows 10 Version 21H2 for 32-bit Systems Remote Code Execution Critical 10.0.19044.5371
Windows Server 2022 (Server Core installation) Remote Code Execution Critical 10.0.20348.3091
Windows Server 2022 Remote Code Execution Critical 10.0.20348.3091
Windows Server 2019 (Server Core installation) Remote Code Execution Critical 10.0.17763.6775
Windows Server 2019 Remote Code Execution Critical 10.0.17763.6775
Windows 10 Version 1809 for x64-based Systems Remote Code Execution Critical 10.0.17763.6775
Windows 10 Version 1809 for 32-bit Systems Remote Code Execution Critical 10.0.17763.6775

 نتیجه گیری

عوامل زیر می توانند در کاهش‌آسیب پذیری مفید باشند:
این آسیب‌پذیری تنها زمانی قابل اکسپلویت کردن است که یک برنامه روی یک پورت Pragmatic General Multicast (PGM) در حال گوش دادن باشد. اگر PGM نصب یا فعال باشد ولی هیچ برنامه‌ای به صورت فعال به عنوان گیرنده (receiver) گوش نکند، این آسیب‌پذیری قابلیت اکسپلویت نخواهد داشت.
از آنجایی که PGM درخواست‌ها را احراز هویت (authenticate) نمی‌کند، توصیه می‌شود دسترسی به هر پورتی که باز است، در سطح شبکه (مثلاً با استفاده از یک Firewall یا …) محافظت شود. همچنین توصیه نمی‌شود که یک گیرنده PGM به اینترنت عمومی
(Public Internet) متصل شود.

منابع

  1. https://www.cve.org/CVERecord?id=CVE-2025-21307
  2. https://www.cvedetails.com/cve/CVE-2025-21307/
  3. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307
  4. https://vulmon.com/vulnerabilitydetails?qid=CVE-2025-21307
  5. https://vuldb.com/?id.291752
  6. https://nvd.nist.gov/vuln/detail/CVE-2025-21307
  7. https://cwe.mitre.org/data/definitions/416.html

همچنین ممکن است دوست داشته باشید

پیام بگذارید