Undergoing Analysis
CVE is currently being analyzed by NVD staff, this process results in association of reference link tags, CVSS scores, CWE association, and CPE applicability statements.
CVE is currently being analyzed by NVD staff, this process results in association of reference link tags, CVSS scores, CWE association, and CPE applicability statements.
Products
Microsoft Power Automate Desktop
Source
secure@microsoft.com
Tags
CVE-2024-43479 details
Published : Sept. 10, 2024, 5:15 p.m.
Last Modified : Sept. 10, 2024, 5:43 p.m.
Last Modified : Sept. 10, 2024, 5:43 p.m.
Description
Microsoft Power Automate Desktop Remote Code Execution Vulnerability
CVSS Score
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8.5 | 9 | 10 |
---|
Weakness
Weakness | Name | Description |
---|---|---|
CWE-284 | Improper Access Control | The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor. |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
8.5
Exploitability Score
1.8
Impact Score
6.0
Base Severity
HIGH
Vector String : CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
References
URL | Source |
---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43479 | secure@microsoft.com |
This website uses the NVD API, but is not approved or certified by it.