Kaspersky ID:
KLA68915
Date de la détection:
06/11/2024
Mis à jour:
03/02/2026

Description

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to cause denial of service, gain privileges, execute arbitrary code, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A denial of service vulnerability in DNS protocol can be exploited remotely to cause denial of service.
  2. A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
  3. An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
  4. An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
  5. A remote code execution vulnerability in Windows Wi-Fi Driver can be exploited remotely to execute arbitrary code.
  6. An elevation of privilege vulnerability in Microsoft Streaming Service can be exploited remotely to gain privileges.
  7. An elevation of privilege vulnerability in Winlogon can be exploited remotely to gain privileges.
  8. A remote code execution vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to execute arbitrary code.
  9. An elevation of privilege vulnerability in Windows Storage can be exploited remotely to gain privileges.
  10. An elevation of privilege vulnerability in Windows Win32 Kernel Subsystem can be exploited remotely to gain privileges.
  11. A denial of service vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to cause denial of service.
  12. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  13. A remote code execution vulnerability in Windows OLE can be exploited remotely to execute arbitrary code.
  14. A remote code execution vulnerability in Windows Distributed File System (DFS) can be exploited remotely to execute arbitrary code.
  15. A denial of service vulnerability in Windows Themes can be exploited remotely to cause denial of service.
  16. A denial of service vulnerability in DHCP Server Service can be exploited remotely to cause denial of service.
  17. An elevation of privilege vulnerability in Windows Perception Service can be exploited remotely to gain privileges.
  18. An information disclosure vulnerability in Windows Remote Access Connection Manager can be exploited remotely to obtain sensitive information.
  19. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  20. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  21. A remote code execution vulnerability in Microsoft Speech Application Programming Interface (SAPI) can be exploited remotely to execute arbitrary code.
  22. An information disclosure vulnerability in Windows Cryptographic Services can be exploited remotely to obtain sensitive information.
  23. An elevation of privilege vulnerability in Windows Container Manager Service can be exploited remotely to gain privileges.
  24. A remote code execution vulnerability in Microsoft Event Trace Log File Parsing can be exploited remotely to execute arbitrary code.
  25. An elevation of privilege vulnerability in WiX toolset can be exploited to gain privileges.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2023-50868
    critical
  • CVE-2024-29187
    high
  • CVE-2024-30080
    critical
  • CVE-2024-30091
    critical
  • CVE-2024-35250
    critical
  • CVE-2024-30084
    high
  • CVE-2024-30078
    critical
  • CVE-2024-30090
    high
  • CVE-2024-30066
    high
  • CVE-2024-30062
    critical
  • CVE-2024-30093
    high
  • CVE-2024-30087
    critical
  • CVE-2024-30086
    critical
  • CVE-2024-30083
    critical
  • CVE-2024-30095
    critical
  • CVE-2024-30067
    high
  • CVE-2024-30077
    critical
  • CVE-2024-30082
    critical
  • CVE-2024-30094
    critical
  • CVE-2024-30063
    high
  • CVE-2024-30065
    high
  • CVE-2024-30070
    critical
  • CVE-2024-35265
    high
  • CVE-2024-30069
    warning
  • CVE-2024-30085
    critical
  • CVE-2024-30099
    high
  • CVE-2024-30068
    critical
  • CVE-2024-30088
    high
  • CVE-2024-30097
    critical
  • CVE-2024-30096
    high
  • CVE-2024-30064
    critical
  • CVE-2024-30076
    high
  • CVE-2024-30072
    critical
  • CVE-2024-30089
    critical

Liste KB

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.