7.8
CVE-2024-30073
- EPSS 0.56%
- Published 10.09.2024 17:15:16
- Last modified 23.09.2024 15:08:43
- Source secure@microsoft.com
- Teams watchlist Login
- Open Login
Windows Security Zone Mapping Security Feature Bypass Vulnerability
Data is provided by the National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 Version < 10.0.10240.20766
Microsoft ≫ Windows 10 1607 Version < 10.0.14393.7336
Microsoft ≫ Windows 10 1809 Version < 10.0.17763.6293
Microsoft ≫ Windows 10 21h2 Version < 10.0.19044.4894
Microsoft ≫ Windows 10 22h2 Version < 10.0.19045.4894
Microsoft ≫ Windows 11 21h2 Version < 10.0.22000.3197
Microsoft ≫ Windows 11 22h2 Version < 10.0.22621.4169
Microsoft ≫ Windows 11 23h2 Version < 10.0.22631.4169
Microsoft ≫ Windows 11 24h2 Version < 10.0.26100.1742
Microsoft ≫ Windows Server 2008 Version- Updatesp2
Microsoft ≫ Windows Server 2008 Versionr2 Updatesp1 HwPlatformx64
Microsoft ≫ Windows Server 2012 Version < 6.2.9200.25073
Microsoft ≫ Windows Server 2012 Versionr2
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.7336
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.6293
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.2700
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1128
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.56% | 0.673 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
secure@microsoft.com | 7.8 | 1.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
CWE-41 Improper Resolution of Path Equivalence
The product is vulnerable to file system contents disclosure through path equivalence. Path equivalence involves the use of special characters in file and directory names. The associated manipulations are intended to generate multiple names for the same object.