7.5
CVE-2024-38119
- EPSS 0.46%
- Veröffentlicht 10.09.2024 17:15:23
- Zuletzt bearbeitet 17.09.2024 17:23:07
- Quelle secure@microsoft.com
- Teams Watchlist Login
- Unerledigt Login
Windows Network Address Translation (NAT) Remote Code Execution Vulnerability
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 1507 HwPlatformx64 Version < 10.0.10240.20766
Microsoft ≫ Windows 10 1507 HwPlatformx86 Version < 10.0.10240.20766
Microsoft ≫ Windows 10 1607 HwPlatformx64 Version < 10.0.14393.7336
Microsoft ≫ Windows 10 1607 HwPlatformx86 Version < 10.0.14393.7336
Microsoft ≫ Windows 10 1809 HwPlatformarm64 Version < 10.0.17763.6293
Microsoft ≫ Windows 10 1809 HwPlatformx64 Version < 10.0.17763.6293
Microsoft ≫ Windows 10 1809 HwPlatformx86 Version < 10.0.17763.6293
Microsoft ≫ Windows 10 21h1 HwPlatformarm64 Version < 10.0.19044.4894
Microsoft ≫ Windows 10 21h1 HwPlatformx64 Version < 10.0.19044.4894
Microsoft ≫ Windows 10 21h1 HwPlatformx86 Version < 10.0.19044.4894
Microsoft ≫ Windows 10 22h2 HwPlatformarm64 Version < 10.0.19041.4894
Microsoft ≫ Windows 10 22h2 HwPlatformx64 Version < 10.0.19045.4894
Microsoft ≫ Windows 10 22h2 HwPlatformx86 Version < 10.0.19045.4894
Microsoft ≫ Windows 11 21h2 HwPlatformarm64 Version < 10.0.22000.3197
Microsoft ≫ Windows 11 21h2 HwPlatformx64 Version < 10.0.22000.3197
Microsoft ≫ Windows 11 22h2 HwPlatformarm64 Version < 10.0.22621.4169
Microsoft ≫ Windows 11 22h2 HwPlatformx64 Version < 10.0.22621.4169
Microsoft ≫ Windows 11 23h2 HwPlatformarm64 Version < 10.0.22631.4169
Microsoft ≫ Windows 11 23h2 HwPlatformx64 Version < 10.0.22631.4169
Microsoft ≫ Windows 11 24h2 HwPlatformarm64 Version < 10.0.26100.1742
Microsoft ≫ Windows 11 24h2 HwPlatformx64 Version < 10.0.26100.1742
Microsoft ≫ Windows Server 2016 Version < 10.0.14393.7336
Microsoft ≫ Windows Server 2019 Version < 10.0.17763.6293
Microsoft ≫ Windows Server 2022 Version < 10.0.20348.2700
Microsoft ≫ Windows Server 2022 23h2 Version < 10.0.25398.1128
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.46% | 0.63 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
secure@microsoft.com | 7.5 | 1.6 | 5.9 |
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
CWE-416 Use After Free
The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.