5.5
CVE-2024-30039
- EPSS 0.35%
- Published 14.05.2024 17:17:11
- Last modified 27.08.2025 21:15:47
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Windows Remote Access Connection Manager Information Disclosure Vulnerability
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.20651
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.20651
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.6981
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.6981
Microsoft ≫ Windows 10 1809 Version < 10.0.17763.5820
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.4412
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.4412
Microsoft ≫ Windows 11 21h2 Version < 10.0.22000.2960
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.3593
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.3593
Microsoft ≫ Windows Server 2008 Version- Updatesp2
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version-
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.6981
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.5820
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.2461
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.887
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.35% | 0.571 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
134c704f-9b21-4f2e-91b3-4a467353bcc0 | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
secure@microsoft.com | 5.5 | 1.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-126 Buffer Over-read
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.