ID: CVE-2023-24949

Last Modified: May 15, 2023

Windows Kernel Elevation of Privilege Vulnerability

Twitter Activity

Tweets last week: 0

Remaining steady

Yahoo Activity

Yahoo results: 0

Remaining steady

EPSS History

Current EPSS Score: 0.00084

Remaining steady


Reddit Activity

Reddit Posts: 0

Remaining steady

Github Repos

Github Repos: 0

Remaining steady

Exploits

Found exploits:

Attack Vector: Local

Attack Complexity: Low

Privileges Required: Low

User Interaction: None

Scope: Unchanged

Confidentiality: High

Integrity: High

Availability: High

Base Score: 7.8

Exploitability Score: 1.8

Impact Score: 5.9

CVSS V3: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Specialize CVSS-Score

NVD-CWE-noinfo

['alert file ( msg:"OS-WINDOWS Microsoft Windows kernel denial of service attempt"; flowbits:isset,file.exe; file_data; content:"|01 00 00 00 00 10 00 00 03 00 00 00 00 00 00 00 FF FF FF FF 8B C8 48 8D 15 3B 22 00 00 48 8B D8 FF 15 F2 1F 00 00 48 8D 15 43 22 00 00 48 8B CB 48 89 05 01 36 00 00 FF 15 DB 1F 00 00 48 83 3D|",fast_pattern,nocase; metadata:policy max-detect-ips drop; reference:cve,2023-24949; reference:url,portal.msrc.microsoft.com/en-us/security-guidance/advisory/CVE-2023-24949; classtype:attempted-dos; gid:1; sid:300524; rev:1; )\n']

Condition Configuration
OR
OR
Alle Schwachstellen für microsoft
Alle Schwachstellen für microsoft
Alle Schwachstellen für microsoft
Alle Schwachstellen für microsoft
Alle Schwachstellen für microsoft
Alle Schwachstellen für microsoft
Alle Schwachstellen für microsoft
Alle Schwachstellen für microsoft
Date: May 15, 2023

CWE-ID: Not defined
Configuration:
added:
cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*



                    <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*"/>
    </set>
</set>

                  
                      <?xml version="1.0" ?>
<set operator="and">
    <set operator="or">
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*"/>
        <prop key="operating_system" value="cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*"/>
    </set>
    <prop key="program_influence" value="input"/>
</set>