7.3

CVE-2024-21409

.NET, .NET Framework, and Visual Studio Remote Code Execution Vulnerability

Data is provided by the National Vulnerability Database (NVD)
Microsoft.Net Framework Version3.5 Update-
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows 11 21h2 Version-
   MicrosoftWindows 11 22h2 Version-
   MicrosoftWindows 11 23h2 Version-
   MicrosoftWindows Server 2022 Version-
Microsoft.Net Framework Version4.8.1
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows 11 21h2 Version-
   MicrosoftWindows 11 22h2 Version-
   MicrosoftWindows 11 23h2 Version-
   MicrosoftWindows Server 2022 Version-
Microsoft.Net Version >= 6.0.0 < 6.0.29
Microsoft.Net Version >= 7.0.0 < 7.0.18
Microsoft.Net Version >= 8.0.0 < 8.0.4
MicrosoftPowershell Version >= 7.2 < 7.2.19
MicrosoftPowershell Version >= 7.3 < 7.3.12
MicrosoftPowershell Version >= 7.4 < 7.4.2
MicrosoftVisual Studio 2022 Version >= 17.4.0 < 17.4.18
MicrosoftVisual Studio 2022 Version >= 17.6.0 < 17.6.14
MicrosoftVisual Studio 2022 Version >= 17.8.0 < 17.8.9
MicrosoftVisual Studio 2022 Version >= 17.9.0 < 17.9.6
Microsoft.Net Framework Version3.5 Update-
   MicrosoftWindows 10 1607 Version-
   MicrosoftWindows 10 1809 Version-
   MicrosoftWindows Server 2016 Version-
   MicrosoftWindows Server 2019 Version-
Microsoft.Net Framework Version4.7.2
   MicrosoftWindows 10 1607 Version-
   MicrosoftWindows 10 1809 Version-
   MicrosoftWindows Server 2016 Version-
   MicrosoftWindows Server 2019 Version-
Microsoft.Net Framework Version4.8
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7.1
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version4.7.2
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
   MicrosoftWindows Server 2012 Version-
   MicrosoftWindows Server 2012 Versionr2
Microsoft.Net Framework Version3.5
   MicrosoftWindows 10 1607 Version-
   MicrosoftWindows 10 1809 Version-
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows 11 21h2 Version-
   MicrosoftWindows Server 2016 Version-
   MicrosoftWindows Server 2019 Version-
   MicrosoftWindows Server 2022 Version-
Microsoft.Net Framework Version4.8
   MicrosoftWindows 10 1607 Version-
   MicrosoftWindows 10 1809 Version-
   MicrosoftWindows 10 21h2 Version-
   MicrosoftWindows 10 22h2 Version-
   MicrosoftWindows 11 21h2 Version-
   MicrosoftWindows Server 2016 Version-
   MicrosoftWindows Server 2019 Version-
   MicrosoftWindows Server 2022 Version-
Microsoft.Net Framework Version4.6.2
   MicrosoftWindows Server 2008 Version- Updatesp2
   MicrosoftWindows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 54.7% 0.98
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secure@microsoft.com 7.3 1.3 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.