- شناسه CVE-2025-21307 :CVE
- CWE-416 :CWE
- msrc.microsoft.com :Advisory
- منتشر شده: ژانویه 14, 2025
- به روز شده: ژانویه 17, 2025
- امتیاز: 9.8
- نوع حمله: Unknown
- اثر گذاری: Remote Code Execution
- محصول: Windows
- وضعیتPublished :CVE
- No :POC
- وضعیت آسیب پذیری: patch شده
چکیده
این بخش ناشناخته ای از درایور RMCAST را تحت تأثیر قرار می دهد. ایجاد تغییرات در ورودی منجر به Use After Free می شود. امکان شروع حمله از طریق این آسیب پذیری از راه دور وجود دارد.
توضیحات
این آسیب پذیری در دسته CWE-416 طبقه بندی می شود. ارجاع به حافظه پس از آزاد شدن آن می تواند باعث از کار افتادن برنامه، استفاده از مقادیر غیرمنتظره یا اجرای کد شود. محرمانه بودن، یکپارچگی و در دسترس بودن از بابت این آسیب پذیری تحت تاثیر قرار می گیرد. اکسپلویت این آسیب پذیری آسان است و هیچ شکلی از احراز هویت برای اکسپلویت لازم نیست.
یک مهاجم احراز هویت نشده میتواند با ارسال بستههای ساختهشده ویژه به سوکت باز Windows Pragmatic General Multicast (PGM) روی سرور، بدون هیچ گونه تعاملی از جانب کاربر، از این آسیبپذیری سوء استفاده کند.
اسکنر آسیب پذیری Nessus افزونه ای با شناسه 214135 (KB5050048: Windows Server 2012 R2 Security Update (ژانویه 2025)) ارائه می دهد که به تعیین وجود نقص در یک محیط هدف کمک می کند.
CVSS
Score | Severity | Version | Vector String |
9.8 | CRITICAL | 3.1 | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
لیست محصولات آسیب پذیر
Versions | Platforms | Product |
affected from 10.0.17763.0 before 10.0.17763.6775 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1809
|
affected from 10.0.17763.0 before 10.0.17763.6775 | x64-based Systems
|
Windows Server 2019
|
affected from 10.0.17763.0 before 10.0.17763.6775 | x64-based Systems
|
Windows Server 2019 (Server Core installation)
|
affected from 10.0.20348.0 before 10.0.20348.3091 | x64-based Systems
|
Windows Server 2022
|
affected from 10.0.19043.0 before 10.0.19044.5371 | 32-bit Systems, ARM64-based Systems, x64-based Systems
|
Windows 10 Version 21H2
|
affected from 10.0.22621.0 before 10.0.22621.4751 | ARM64-based Systems, x64-based Systems
|
Windows 11 version 22H2
|
affected from 10.0.19045.0 before 10.0.19045.5371 | x64-based Systems, ARM64-based Systems, 32-bit Systems
|
Windows 10 Version 22H2
|
affected from 10.0.26100.0 before 10.0.26100.2894 | x64-based Systems
|
Windows Server 2025 (Server Core installation)
|
affected from 10.0.22631.0 before 10.0.22631.4751 | ARM64-based Systems
|
Windows 11 version 22H3
|
affected from 10.0.22631.0 before 10.0.22631.4751 | x64-based Systems
|
Windows 11 Version 23H2
|
affected from 10.0.25398.0 before 10.0.25398.1369 | x64-based Systems
|
Windows Server 2022, 23H2 Edition (Server Core installation)
|
affected from 10.0.26100.0 before 10.0.26100.2894 | ARM64-based Systems, x64-based Systems
|
Windows 11 Version 24H2
|
affected from 10.0.26100.0 before 10.0.26100.2894 | x64-based Systems
|
Windows Server 2025
|
affected from 10.0.10240.0 before 10.0.10240.20890 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1507
|
affected from 10.0.14393.0 before 10.0.14393.7699 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1607
|
affected from 10.0.14393.0 before 10.0.14393.7699 | x64-based Systems
|
Windows Server 2016
|
affected from 10.0.14393.0 before 10.0.14393.7699 | x64-based Systems
|
Windows Server 2016 (Server Core installation)
|
affected from 6.0.6003.0 before 6.0.6003.23070 | 32-bit Systems
|
Windows Server 2008 Service Pack 2
|
affected from 6.0.6003.0 before 6.0.6003.23070 | 32-bit Systems, x64-based Systems
|
Windows Server 2008 Service Pack 2 (Server Core installation)
|
affected from 6.0.6003.0 before 6.0.6003.23070 | x64-based Systems
|
Windows Server 2008 Service Pack 2
|
affected from 6.1.7601.0 before 6.1.7601.27520 | x64-based Systems
|
Windows Server 2008 R2 Service Pack 1
|
affected from 6.1.7601.0 before 6.1.7601.27520 | x64-based Systems
|
Windows Server 2008 R2 Service Pack 1 (Server Core installation)
|
affected from 6.2.9200.0 before 6.2.9200.25273 | x64-based Systems
|
Windows Server 2012
|
affected from 6.2.9200.0 before 6.2.9200.25273 | x64-based Systems
|
Windows Server 2012 (Server Core installation)
|
affected from 6.3.9600.0 before 6.3.9600.22371 | x64-based Systems
|
Windows Server 2012 R2
|
affected from 6.3.9600.0 before 6.3.9600.22371 | x64-based Systems
|
Windows Server 2012 R2 (Server Core installation)
|
لیست محصولات بروز شده
Product | Impact | Max Severity | Build Number |
Windows 10 Version 1607 for 32-bit Systems | Remote Code Execution | Critical | 10.0.14393.7699 |
Windows 10 for x64-based Systems | Remote Code Execution | Critical | 10.0.10240.20890 |
Windows 10 for 32-bit Systems | Remote Code Execution | Critical | 10.0.10240.20890 |
Windows Server 2025 | Remote Code Execution | Critical | 10.0.26100.2894 |
Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.26100.2894 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Critical | 6.3.9600.22371 |
Windows Server 2012 R2 | Remote Code Execution | Critical | 6.3.9600.22371 |
Windows Server 2012 (Server Core installation) | Remote Code Execution | Critical | 6.2.9200.25273 |
Windows Server 2012 | Remote Code Execution | Critical | 6.2.9200.25273 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Critical | 6.1.7601.27520 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Critical | 6.1.7601.27520 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Critical | 6.1.7601.27520 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Critical | 6.1.7601.27520 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Critical | 6.0.6003.23070 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Critical | 6.0.6003.23070 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Critical | 6.0.6003.23070 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Critical | 6.0.6003.23070 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Critical | 6.0.6003.23070 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Critical | 6.0.6003.23070 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Critical | 6.0.6003.23070 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Critical | 6.0.6003.23070 |
Windows Server 2016 (Server Core installation) | Remote Code Execution | Critical | 10.0.14393.7699 |
Windows Server 2016 | Remote Code Execution | Critical | 10.0.14393.7699 |
Windows 10 Version 1607 for x64-based Systems | Remote Code Execution | Critical | 10.0.14393.7699 |
Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.26100.2894 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Critical | 10.0.25398.1369 |
Windows 11 Version 23H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.22631.4751 |
Windows 11 Version 23H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.22631.4751 |
Windows Server 2025 (Server Core installation) | Remote Code Execution | Critical | 10.0.26100.2894 |
Windows 10 Version 22H2 for 32-bit Systems | Remote Code Execution | Critical | 10.0.19045.5371 |
Windows 10 Version 22H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.19045.5371 |
Windows 10 Version 22H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.19045.5371 |
Windows 11 Version 22H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.22621.4751 |
Windows 11 Version 22H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.22621.4751 |
Windows 10 Version 21H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.19044.5371 |
Windows 10 Version 21H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.19044.5371 |
Windows 10 Version 21H2 for 32-bit Systems | Remote Code Execution | Critical | 10.0.19044.5371 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Critical | 10.0.20348.3091 |
Windows Server 2022 | Remote Code Execution | Critical | 10.0.20348.3091 |
Windows Server 2019 (Server Core installation) | Remote Code Execution | Critical | 10.0.17763.6775 |
Windows Server 2019 | Remote Code Execution | Critical | 10.0.17763.6775 |
Windows 10 Version 1809 for x64-based Systems | Remote Code Execution | Critical | 10.0.17763.6775 |
Windows 10 Version 1809 for 32-bit Systems | Remote Code Execution | Critical | 10.0.17763.6775 |
نتیجه گیری
عوامل زیر می توانند در کاهشآسیب پذیری مفید باشند:
این آسیبپذیری تنها زمانی قابل اکسپلویت کردن است که یک برنامه روی یک پورت Pragmatic General Multicast (PGM) در حال گوش دادن باشد. اگر PGM نصب یا فعال باشد ولی هیچ برنامهای به صورت فعال به عنوان گیرنده (receiver) گوش نکند، این آسیبپذیری قابلیت اکسپلویت نخواهد داشت.
از آنجایی که PGM درخواستها را احراز هویت (authenticate) نمیکند، توصیه میشود دسترسی به هر پورتی که باز است، در سطح شبکه (مثلاً با استفاده از یک Firewall یا …) محافظت شود. همچنین توصیه نمیشود که یک گیرنده PGM به اینترنت عمومی
(Public Internet) متصل شود.
منابع
- https://www.cve.org/CVERecord?id=CVE-2025-21307
- https://www.cvedetails.com/cve/CVE-2025-21307/
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21307
- https://vulmon.com/vulnerabilitydetails?qid=CVE-2025-21307
- https://vuldb.com/?id.291752
- https://nvd.nist.gov/vuln/detail/CVE-2025-21307
- https://cwe.mitre.org/data/definitions/416.html