CVE-2024-43532
Oct. 16, 2024, 9:51 p.m.
8.8
High
Description
Remote Registry Service Elevation of Privilege Vulnerability
Product(s) Impacted
Vendor | Product | Versions |
---|---|---|
Microsoft |
|
|
Weaknesses
CWE-636
Not Failing Securely ('Failing Open')
When the product encounters an error condition or failure, its design requires it to fall back to a state that is less secure than other options that are available, such as selecting the weakest encryption algorithm or using the most permissive access control restrictions.
*CPE(s)
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
o | microsoft | windows_10_1507 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_10_1507 | / | / | / | / | / | / | x86 | / |
o | microsoft | windows_10_1607 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_10_1607 | / | / | / | / | / | / | x86 | / |
o | microsoft | windows_10_1809 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_10_1809 | / | / | / | / | / | / | x86 | / |
o | microsoft | windows_10_21h2 | / | / | / | / | / | / | arm64 | / |
o | microsoft | windows_10_21h2 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_10_21h2 | / | / | / | / | / | / | x86 | / |
o | microsoft | windows_10_22h2 | / | / | / | / | / | / | arm64 | / |
o | microsoft | windows_10_22h2 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_10_22h2 | / | / | / | / | / | / | x86 | / |
o | microsoft | windows_11_21h2 | / | / | / | / | / | / | arm64 | / |
o | microsoft | windows_11_21h2 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_11_22h2 | / | / | / | / | / | / | arm64 | / |
o | microsoft | windows_11_22h2 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_11_23h2 | / | / | / | / | / | / | arm64 | / |
o | microsoft | windows_11_23h2 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_11_24h2 | / | / | / | / | / | / | arm64 | / |
o | microsoft | windows_11_24h2 | / | / | / | / | / | / | x64 | / |
o | microsoft | windows_server_2008 | - | sp2 | / | / | / | / | x64 | / |
o | microsoft | windows_server_2008 | - | sp2 | / | / | / | / | x86 | / |
o | microsoft | windows_server_2008 | r2 | sp1 | / | / | / | / | x64 | / |
o | microsoft | windows_server_2012 | - | / | / | / | / | / | / | / |
o | microsoft | windows_server_2012 | r2 | / | / | / | / | / | / | / |
o | microsoft | windows_server_2016 | / | / | / | / | / | / | / | / |
o | microsoft | windows_server_2019 | / | / | / | / | / | / | / | / |
o | microsoft | windows_server_2022 | / | / | / | / | / | / | / | / |
o | microsoft | windows_server_2022_23h2 | / | / | / | / | / | / | / | / |
Tags
CVSS Score
CVSS Data
- Attack Vector: NETWORK
- Attack Complexity: LOW
- Privileges Required: LOW
- Scope: UNCHANGED
- Confidentiality Impact: HIGH
- Integrity Impact: HIGH
- Availability Impact: HIGH
View Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Date
- Published: Oct. 8, 2024, 6:15 p.m.
- Last Modified: Oct. 16, 2024, 9:51 p.m.
Status : Analyzed
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
secure@microsoft.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.