- شناسه CVE-2025-21376 :CVE
- CWE-362 , CWE-191 , CWE-122 :CWE
- yes :Advisory
- منتشر شده: فوریه 11, 2025
- به روز شده: فوریه 14, 2025
- امتیاز: 8.1
- نوع حمله: Unknown
- اثر گذاری: Remote code execution(RCE)
- حوزه: سیستمعاملها و اجزای کلیدی آن
- برند: Microsoft
- محصول: Windows
- وضعیتPublished :CVE
- No :POC
- وضعیت آسیب پذیری: patch شده
چکیده
یک آسیبپذیری در سیستمعامل مایکروسافت ویندوز شناسایی شده است. این آسیبپذیری مربوط به بخشی از کامپوننت LDAP (Lightweight Directory Access Protocol) بوده و در اثر ایجاد تغییرات، منجر به کمبود عدد صحیح (Integer Underflow) میشود. حمله از طریق این ضعف امنیتی از راه دور امکانپذیر است. توصیه میشود که برای رفع این مشکل، بهروزرسانی امنیتی (Patch) اعمال شود.
توضیحات
آسیبپذیری مربوط به پردازش نامشخصی در کامپوننت LDAP بوده و در اثر دریافت ورودی ناشناخته، منجر به کاهش عدد صحیح (Integer Underflow) میشود. طبق تعریف CWE-191، این مشکل زمانی رخ میدهد که مقدار عددی از مقدار مجاز آن کمتر شود و منجر به تولید یک مقدار نادرست گردد. این آسیبپذیری محرمانگی (Confidentiality)، یکپارچگی (Integrity) و دسترسیپذیری (Availability) سیستم را تحت تأثیر قرار میدهد.
اکسپلویت این آسیب پذیری دشوار است، اما حمله از راه دور ممکن بوده و نیازی به احراز هویت ندارد.
بر اساس معیار CVSS، پیچیدگی حمله (Attack Complexity – AC) برای این آسیبپذیری زیاد ارزیابی شده است. این بدان معناست که اجرای موفقیتآمیز حمله دشوار است و مهاجم برای بهرهبرداری از این آسیبپذیری نیاز به برآورده کردن شرایط خاصی دارد، مانند زمانبندی دقیق یا شرایط سیستمی خاص که همیشه بهراحتی در دسترس نیستند.
برای بهرهبرداری موفقیتآمیز از این آسیبپذیری، مهاجم باید یک شرایط رقابتی (Race Condition) را برنده شود. شرایط رقابتی زمانی رخ میدهد که دو یا چند فرایند بهطور همزمان به یک منبع مشترک دسترسی داشته باشند و ترتیب اجرای آنها بر نتیجه نهایی تأثیر بگذارد. در این مورد، مهاجم باید بتواند در زمان مناسب و با دقت بالا، درخواست مخرب خود را اجرا کند تا موفق به اکسپلویت نقص امنیتی شود.
یک مهاجم غیرمجاز و بدون نیاز به احراز هویت میتواند یک درخواست مخرب و ویژه را به یک سرور LDAP آسیبپذیر ارسال کند. در صورتی که حمله موفقیتآمیز باشد، میتواند منجر به سرریز بافر (Buffer Overflow) شده و در نهایت، مهاجم بتواند اجرای کد از راه دور (Remote Code Execution – RCE) را روی سیستم هدف انجام دهد.
CVSS
Score | Severity | Version | Vector String |
8.1 | HIGH | 3.1 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C |
لیست محصولات آسیب پذیر
Versions | Platforms | Product |
affected from 10.0.17763.0 before 10.0.17763.6893 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1809
|
affected from 10.0.17763.0 before 10.0.17763.6893 | x64-based Systems
|
Windows Server 2019
|
affected from 10.0.17763.0 before 10.0.17763.6893 | x64-based Systems
|
Windows Server 2019 (Server Core installation)
|
affected from 10.0.20348.0 before 10.0.20348.3207 | x64-based Systems
|
Windows Server 2022
|
affected from 10.0.19043.0 before 10.0.19044.5487 | 32-bit Systems, ARM64-based Systems, x64-based Systems
|
Windows 10 Version 21H2
|
affected from 10.0.22621.0 before 10.0.22621.4890 | ARM64-based Systems, x64-based Systems
|
Windows 11 version 22H2
|
affected from 10.0.19045.0 before 10.0.19045.5487 | x64-based Systems, ARM64-based Systems, 32-bit Systems
|
Windows 10 Version 22H2
|
affected from 10.0.26100.0 before 10.0.26100.3194 | x64-based Systems
|
Windows Server 2025 (Server Core installation)
|
affected from 10.0.22631.0 before 10.0.22631.4890 | ARM64-based Systems
|
Windows 11 version 22H3
|
affected from 10.0.22631.0 before 10.0.22631.4890 | x64-based Systems
|
Windows 11 Version 23H2
|
affected from 10.0.25398.0 before 10.0.25398.1425 | x64-based Systems
|
Windows Server 2022, 23H2 Edition (Server Core installation)
|
affected from 10.0.26100.0 before 10.0.26100.3194 | ARM64-based Systems, x64-based Systems
|
Windows 11 Version 24H2
|
affected from 10.0.26100.0 before 10.0.26100.3194 | x64-based Systems
|
Windows Server 2025
|
affected from 10.0.10240.0 before 10.0.10240.20915 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1507
|
affected from 10.0.14393.0 before 10.0.14393.7785 | 32-bit Systems, x64-based Systems
|
Windows 10 Version 1607
|
affected from 10.0.14393.0 before 10.0.14393.7785 | x64-based Systems
|
Windows Server 2016
|
affected from 10.0.14393.0 before 10.0.14393.7785 | x64-based Systems
|
Windows Server 2016 (Server Core installation)
|
affected from 6.0.6003.0 before 6.0.6003.23117 | 32-bit Systems
|
Windows Server 2008 Service Pack 2
|
affected from 6.0.6003.0 before 6.0.6003.23117 | 32-bit Systems, x64-based Systems
|
Windows Server 2008 Service Pack 2 (Server Core installation)
|
affected from 6.0.6003.0 before 6.0.6003.23117 | x64-based Systems
|
Windows Server 2008 Service Pack 2
|
affected from 6.1.7601.0 before 6.1.7601.27566 | x64-based Systems
|
Windows Server 2008 R2 Service Pack 1
|
affected from 6.1.7601.0 before 6.1.7601.27566 | x64-based Systems
|
Windows Server 2008 R2 Service Pack 1 (Server Core installation)
|
affected from 6.2.9200.0 before 6.2.9200.25317 | x64-based Systems
|
Windows Server 2012
|
affected from 6.2.9200.0 before 6.2.9200.25317 | x64-based Systems
|
Windows Server 2012 (Server Core installation)
|
affected from 6.3.9600.0 before 6.3.9600.22417 | x64-based Systems
|
Windows Server 2012 R2
|
affected from 6.3.9600.0 before 6.3.9600.22417 | x64-based Systems
|
Windows Server 2012 R2 (Server Core installation)
|
لیست محصولات بروز شده
Product | Impact | Max Severity | Build Number |
Windows Server 2025 | Remote Code Execution | Critical | 10.0.26100.3194 |
Windows Server 2025 | Remote Code Execution | Critical | 10.0.26100.3107 |
Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.26100.3194 |
Windows 11 Version 24H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.26100.3107 |
Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.26100.3194 |
Windows 11 Version 24H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.26100.3107 |
Windows Server 2022, 23H2 Edition (Server Core installation) | Remote Code Execution | Critical | 10.0.25398.1425 |
Windows 11 Version 23H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.22631.4890 |
Windows 11 Version 23H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.22631.4890 |
Windows Server 2025 (Server Core installation) | Remote Code Execution | Critical | 10.0.26100.3194 |
Windows Server 2025 (Server Core installation) | Remote Code Execution | Critical | 10.0.26100.3107 |
Windows 10 Version 22H2 for 32-bit Systems | Remote Code Execution | Critical | 10.0.19045.5487 |
Windows 10 Version 22H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.19045.5487 |
Windows 10 Version 22H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.19045.5487 |
Windows 11 Version 22H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.22621.4890 |
Windows Server 2012 R2 (Server Core installation) | Remote Code Execution | Critical | 6.3.9600.22417 |
Windows Server 2012 R2 | Remote Code Execution | Critical | 6.3.9600.22417 |
Windows Server 2012 (Server Core installation) | Remote Code Execution | Critical | 6.2.9200.25317 |
Windows Server 2012 | Remote Code Execution | Critical | 6.2.9200.25317 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Critical | 6.1.7601.27566 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) | Remote Code Execution | Critical | 6.1.7601.27566 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Critical | 6.1.7601.27566 |
Windows Server 2008 R2 for x64-based Systems Service Pack 1 | Remote Code Execution | Critical | 6.1.7601.27566 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Critical | 6.0.6003.23117 |
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Critical | 6.0.6003.23117 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Critical | 6.0.6003.23117 |
Windows Server 2008 for x64-based Systems Service Pack 2 | Remote Code Execution | Critical | 6.0.6003.23117 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Critical | 6.0.6003.23117 |
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | Remote Code Execution | Critical | 6.0.6003.23117 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Critical | 6.0.6003.23117 |
Windows Server 2008 for 32-bit Systems Service Pack 2 | Remote Code Execution | Critical | 6.0.6003.23117 |
Windows Server 2016 (Server Core installation) | Remote Code Execution | Critical | 10.0.14393.7785 |
Windows Server 2016 | Remote Code Execution | Critical | 10.0.14393.7785 |
Windows 10 Version 1607 for x64-based Systems | Remote Code Execution | Critical | 10.0.14393.7785 |
Windows 10 Version 1607 for 32-bit Systems | Remote Code Execution | Critical | 10.0.14393.7785 |
Windows 10 for x64-based Systems | Remote Code Execution | Critical | 10.0.10240.20915 |
Windows 10 for 32-bit Systems | Remote Code Execution | Critical | 10.0.10240.20915 |
Windows 11 Version 22H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.22621.4890 |
Windows 10 Version 21H2 for x64-based Systems | Remote Code Execution | Critical | 10.0.19044.5487 |
Windows 10 Version 21H2 for ARM64-based Systems | Remote Code Execution | Critical | 10.0.19044.5487 |
Windows 10 Version 21H2 for 32-bit Systems | Remote Code Execution | Critical | 10.0.19044.5487 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Critical | 10.0.20348.3207 |
Windows Server 2022 (Server Core installation) | Remote Code Execution | Critical | 10.0.20348.3148 |
Windows Server 2022 | Remote Code Execution | Critical | 10.0.20348.3207 |
Windows Server 2022 | Remote Code Execution | Critical | 10.0.20348.3148 |
Windows Server 2019 (Server Core installation) | Remote Code Execution | Critical | 10.0.17763.6893 |
Windows Server 2019 | Remote Code Execution | Critical | 10.0.17763.6893 |
Windows 10 Version 1809 for x64-based Systems | Remote Code Execution | Critical | 10.0.17763.6893 |
Windows 10 Version 1809 for 32-bit Systems | Remote Code Execution | Critical | 10.0.17763.6893 |
نتیجه گیری
اعمال بهروزرسانی امنیتی (Patch) میتواند این مشکل را برطرف کند.
منابع
- https://www.cve.org/CVERecord?id=CVE-2025-21376
- https://www.cvedetails.com/cve/CVE-2025-21376/
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21376
- https://vulmon.com/vulnerabilitydetails?qid=CVE-2025-21376
- https://vuldb.com/?id.295315
- https://nvd.nist.gov/vuln/detail/CVE-2025-21376
- https://cwe.mitre.org/data/definitions/362.html
- https://cwe.mitre.org/data/definitions/191.html
- https://cwe.mitre.org/data/definitions/122.html