NVD Vulnerability Detail
Search Exploit, PoC
CVE-2024-38045
Summary

Windows TCP/IP Remote Code Execution Vulnerability

Publication Date Sept. 11, 2024, 2:15 a.m.
Registration Date Sept. 11, 2024, 5 a.m.
Last Update Sept. 19, 2024, 12:04 a.m.
CVSS3.1 : HIGH
スコア 8.1
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* 10.0.17763.6293
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* 10.0.20348.2700
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* 10.0.25398.1128
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* 10.0.26100.1742
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* 10.0.26100.1742
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:* 10.0.19045.4894
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:* 10.0.19045.4894
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:* 10.0.22631.4169
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:* 10.0.22621.4169
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:* 10.0.22621.4169
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:* 10.0.22000.3197
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:* 10.0.22000.3197
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:* 10.0.17763.6293
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:* 10.0.17763.6293
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:* 10.0.17763.6293
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:* 10.0.19044.4894
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:* 10.0.19045.4894
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:* 10.0.22631.4169
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:* 10.0.19044.4894
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:* 10.0.19044.4894
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
マイクロソフトの複数の Microsoft Windows 製品におけるリモートでコードを実行される脆弱性
Title マイクロソフトの複数の Microsoft Windows 製品におけるリモートでコードを実行される脆弱性
Summary

マイクロソフトの Microsoft Windows 10、Windows 11、Windows Server には、Windows TCP/IP に不備があるため、リモートでコードを実行される脆弱性が存在します。

Possible impacts リモートでコードを実行される可能性があります。 
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date Sept. 10, 2024, midnight
Registration Date Sept. 19, 2024, 5:35 p.m.
Last Update Sept. 19, 2024, 5:35 p.m.
Affected System
マイクロソフト
Microsoft Windows 10 Version 1809 for 32-bit Systems
Microsoft Windows 10 Version 1809 for ARM64-based Systems
Microsoft Windows 10 Version 1809 for x64-based Systems
Microsoft Windows 10 Version 21H2 for 32-bit Systems
Microsoft Windows 10 Version 21H2 for ARM64-based Systems
Microsoft Windows 10 Version 21H2 for x64-based Systems
Microsoft Windows 10 Version 22H2 for 32-bit Systems
Microsoft Windows 10 Version 22H2 for ARM64-based Systems
Microsoft Windows 10 Version 22H2 for x64-based Systems
Microsoft Windows 11 version 21H2 for ARM64-based Systems
Microsoft Windows 11 version 21H2 for x64-based Systems
Microsoft Windows 11 Version 22H2 for ARM64-based Systems
Microsoft Windows 11 Version 22H2 for x64-based Systems
Microsoft Windows 11 Version 23H2 for ARM64-based Systems
Microsoft Windows 11 Version 23H2 for x64-based Systems
Microsoft Windows 11 Version 24H2 for ARM64-based Systems
Microsoft Windows 11 Version 24H2 for x64-based Systems
Microsoft Windows Server 2019 
Microsoft Windows Server 2019 (Server Core installation)
Microsoft Windows Server 2022 
Microsoft Windows Server 2022 (Server Core installation)
Microsoft Windows Server 2022 , 23H2 Edition (Server Core installation)
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
1 [2024年09月19日]   掲載 Sept. 19, 2024, 3:12 p.m.