8.1

CVE-2023-41767

Layer 2 Tunneling Protocol Remote Code Execution Vulnerability

Data is provided by the National Vulnerability Database (NVD)
MicrosoftWindows 10 1507 Version < 10.0.10240.20232
MicrosoftWindows 10 1607 Version < 10.0.14393.6351
MicrosoftWindows 10 1809 Version < 10.0.17763.4974
MicrosoftWindows 10 21h2 Version < 10.0.19041.3570
MicrosoftWindows 10 22h2 Version < 10.0.19045.3570
MicrosoftWindows 11 21h2 Version < 10.0.22000.2538
MicrosoftWindows 11 22h2 Version < 10.0.22621.2428
MicrosoftWindows Server 2008 Version- Updatesp2
MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.22% 0.445
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secure@microsoft.com 8.1 2.2 5.9
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.

CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.