|
Versie 1.00 |
08-10-2024 |
NCSC-2024-0392 |
|
|
medium
|
high
|
Signed-PGP →
CSAF →
PDF →
|
|
08-10-2024 |
medium
|
high
|
NCSC-2024-0392 [1.00] |
Signed-PGP →
Text,
CSAF
(sig),
PDF
|
Kenmerken |
Kenmerken
- Improper Input Validation
- Integer Overflow or Wraparound
- Numeric Truncation Error
- Incorrect Access of Indexable Resource ('Range Error')
- Loop with Unreachable Exit Condition ('Infinite Loop')
- Double Free
- Protection Mechanism Failure
- Use After Free
- Inclusion of Functionality from Untrusted Control Sphere
- Missing Authorization
- URL Redirection to Untrusted Site ('Open Redirect')
- Sensitive Data Storage in Improperly Locked Memory
- Use of Uninitialized Resource
- Time-of-check Time-of-use (TOCTOU) Race Condition
- NULL Pointer Dereference
- Stack-based Buffer Overflow
- Untrusted Pointer Dereference
- Execution with Unnecessary Privileges
- Allocation of Resources Without Limits or Throttling
- Improper Link Resolution Before File Access ('Link Following')
- Out-of-bounds Read
- External Control of File Name or Path
- Free of Memory not on the Heap
- Improper Restriction of Communication Channel to Intended Endpoints
- Observable Discrepancy
- Uncontrolled Resource Consumption
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Buffer Over-read
- Improper Neutralization
- Improper Access Control
- Heap-based Buffer Overflow
- Missing Cryptographic Step
- Improper Authorization
- Incorrect Check of Function Return Value
- Improper Removal of Sensitive Information Before Storage or Transfer
- Improper Certificate Validation
- Not Failing Securely ('Failing Open')
- Improper Authentication
|
Omschrijving |
Omschrijving
Microsoft heeft kwetsbaarheden verholpen in Windows.
Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot onderstaande categorieën schade. De ernstigste kwetsbaarheid heeft kenmerk CVE-2024-38124 toegewezen gekregen en bevindt zich in de NETLOGON functionaliteit. Succesvol misbruik is echter niet eenvoudig en vereist voorafgaande kennis van de infrastructuur en precieze timing, waarbij een randvoorwaarde van succes is dat er een nieuwe Domain Controller wordt ingericht.
```
Microsoft Simple Certificate Enrollment Protocol:
Windows cURL Implementation:
CVE-ID | CVSS | Impact |
CVE-2024-6197 | 8.80 | Uitvoeren van willekeurige code, |
Windows Secure Channel:
Windows Remote Desktop:
Microsoft ActiveX:
Windows Telephony Server:
Windows Remote Desktop Services:
Windows MSHTML Platform:
Windows Mobile Broadband:
Windows Standards-Based Storage Management Service:
Microsoft WDAC OLE DB provider for SQL:
Remote Desktop Client:
Windows Kernel-Mode Drivers:
Code Integrity Guard:
Windows Print Spooler Components:
Windows Resilient File System (ReFS):
Microsoft Management Console:
RPC Endpoint Mapper Service:
Microsoft Graphics Component:
Windows Local Security Authority (LSA):
Sudo for Windows:
Windows Scripting:
Winlogon:
Windows Kerberos:
Windows Cryptographic Services:
Windows Routing and Remote Access Service (RRAS):
Windows EFI Partition:
Role: Windows Hyper-V:
Windows Hyper-V:
Windows NT OS Kernel:
Windows Network Address Translation (NAT):
Windows Remote Desktop Licensing Service:
OpenSSH for Windows:
Windows NTFS:
Windows Netlogon:
Windows Storage Port Driver:
Windows Common Log File System Driver:
Windows Secure Kernel Mode:
Microsoft Windows Speech:
Windows Ancillary Function Driver for WinSock:
Windows BitLocker:
Windows Online Certificate Status Protocol (OCSP):
Internet Small Computer Systems Interface (iSCSI):
Windows Kernel:
Azure Stack:
Windows Storage:
Windows Shell:
BranchCache:
```
|
Bereik |
Bereik
Platforms |
Producten |
Versies |
windows
windows_10
windows_11
windows_server_2008
windows_server_2012
windows_server_2016
windows_server_2019
windows_server_2022
windows_server_2022_23h2
|
microsoft azure_stack_hci
microsoft remote_desktop_client_for_windows_desktop
microsoft windows
microsoft windows_10_version_1507
microsoft windows_10_version_1607
microsoft windows_10_version_1809
microsoft windows_10_version_21h2
microsoft windows_10_version_22h2
microsoft windows_11_version_21h2
microsoft windows_11_version_22h2
microsoft windows_11_version_22h3
microsoft windows_11_version_23h2
microsoft windows_11_version_24h2
microsoft windows_server_2008__service_pack_2
microsoft windows_server_2008_r2_service_pack_1
microsoft windows_server_2008_r2_service_pack_1__server_core_installation_ microsoft windows_server_2008_service_pack_2 microsoft windows_server_2008_service_pack_2__server_core_installation_ microsoft windows_server_2012 microsoft windows_server_2012__server_core_installation_ microsoft windows_server_2012_r2 microsoft windows_server_2012_r2__server_core_installation_ microsoft windows_server_2016 microsoft windows_server_2016__server_core_installation_ microsoft windows_server_2019 microsoft windows_server_2019__server_core_installation_ microsoft windows_server_2022 microsoft windows_server_2022__23h2_edition__server_core_installation_
|
10.2408.1.9 - 20349.2700 - 1.2.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 6.0.0 - 6.1.0 - 6.0.0 - 6.0.0 - 6.0.0 - 6.2.0 - 6.2.0 - 6.3.0 - 6.3.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0 - 10.0.0
|
|
Oplossingen |
Oplossingen
Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds [Link]
|
CVE’s |
CVE’s
CVE-2024-6197, CVE-2024-20659, CVE-2024-30092, CVE-2024-37976, CVE-2024-37979, CVE-2024-37982, CVE-2024-37983, CVE-2024-38029, CVE-2024-38124, CVE-2024-38129, CVE-2024-38149, CVE-2024-38179, CVE-2024-38212, CVE-2024-38261, CVE-2024-38262, CVE-2024-38265, CVE-2024-43453, CVE-2024-43456, CVE-2024-43500, CVE-2024-43501, CVE-2024-43502, CVE-2024-43506, CVE-2024-43508, CVE-2024-43509, CVE-2024-43511, CVE-2024-43512, CVE-2024-43513, CVE-2024-43514, CVE-2024-43515, CVE-2024-43516, CVE-2024-43517, CVE-2024-43518, CVE-2024-43519, CVE-2024-43520, CVE-2024-43521, CVE-2024-43522, CVE-2024-43523, CVE-2024-43524, CVE-2024-43525, CVE-2024-43526, CVE-2024-43527, CVE-2024-43528, CVE-2024-43529, CVE-2024-43532, CVE-2024-43533, CVE-2024-43534, CVE-2024-43535, CVE-2024-43536, CVE-2024-43537, CVE-2024-43538, CVE-2024-43540, CVE-2024-43541, CVE-2024-43542, CVE-2024-43543, CVE-2024-43544, CVE-2024-43545, CVE-2024-43546, CVE-2024-43547, CVE-2024-43549, CVE-2024-43550, CVE-2024-43551, CVE-2024-43552, CVE-2024-43553, CVE-2024-43554, CVE-2024-43555, CVE-2024-43556, CVE-2024-43557, CVE-2024-43558, CVE-2024-43559, CVE-2024-43560, CVE-2024-43561, CVE-2024-43562, CVE-2024-43563, CVE-2024-43564, CVE-2024-43565, CVE-2024-43567, CVE-2024-43570, CVE-2024-43571, CVE-2024-43572, CVE-2024-43573, CVE-2024-43574, CVE-2024-43575, CVE-2024-43581, CVE-2024-43582, CVE-2024-43583, CVE-2024-43584, CVE-2024-43585, CVE-2024-43589, CVE-2024-43592, CVE-2024-43593, CVE-2024-43599, CVE-2024-43607, CVE-2024-43608, CVE-2024-43611, CVE-2024-43615
|
|
Versie 1.00 |
08-10-2024 |
NCSC-2024-0392 |
|
|
medium
|
high
|
Signed-PGP →
CSAF →
PDF →
|
|
08-10-2024 |
medium
|
high
|
NCSC-2024-0392 [1.00] |
Signed-PGP →
Text,
CSAF
(sig),
PDF
|