Kaspersky ID:
KLA77106
Data de detecção:
11/12/2024
Atualizado:
01/28/2026

Descrição

Multiple vulnerabilities were found in Microsoft Products (Extended Security Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Windows Telephony Service can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  3. An elevation of privilege vulnerability in Windows Telephony Service can be exploited remotely to gain privileges.
  4. An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows USB Video Class System Driver can be exploited remotely to gain privileges.
  6. An elevation of privilege vulnerability in Windows Registry can be exploited remotely to gain privileges.
  7. A spoofing vulnerability in NTLM Hash Disclosure can be exploited remotely to spoof user interface.
  8. A spoofing vulnerability in Windows DNS can be exploited remotely to spoof user interface.
  9. A remote code execution vulnerability in Windows KDC Proxy can be exploited remotely to execute arbitrary code.
  10. An elevation of privilege vulnerability in Active Directory Certificate Services can be exploited remotely to gain privileges.
  11. An information disclosure vulnerability in Windows Package Library Manager can be exploited remotely to obtain sensitive information.
  12. An elevation of privilege vulnerability in Windows NT OS Kernel can be exploited remotely to gain privileges.
  13. An elevation of privilege vulnerability in Windows Client-Side Caching can be exploited remotely to gain privileges.

Comunicados originais

Exploração

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produtos relacionados

Lista de CVE

  • CVE-2024-43635
    critical
  • CVE-2024-43636
    critical
  • CVE-2024-43626
    critical
  • CVE-2024-49046
    critical
  • CVE-2024-43643
    high
  • CVE-2024-43449
    high
  • CVE-2024-43641
    critical
  • CVE-2024-43621
    critical
  • CVE-2024-43638
    high
  • CVE-2024-43451
    high
  • CVE-2024-43627
    critical
  • CVE-2024-43452
    critical
  • CVE-2024-43450
    critical
  • CVE-2024-43620
    critical
  • CVE-2024-43634
    high
  • CVE-2024-43639
    critical
  • CVE-2024-43637
    high
  • CVE-2024-43622
    critical
  • CVE-2024-49019
    critical
  • CVE-2024-43628
    critical
  • CVE-2024-38203
    high
  • CVE-2024-43623
    critical
  • CVE-2024-43644
    critical

Lista de KB

Saiba mais

Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com

Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!
Kaspersky Next:
cibersegurança redefinida
Saber mais
Novo Kaspersky!
Sua vida dgital merece proteção completa!
Saber mais
Do you want to save your changes?
Your message has been sent successfully.