Kaspersky ID:
KLA78025
Дата обнаружения:
10/12/2024
Обновлено:
12/12/2024

Описание

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, cause denial of service, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability in Windows Mobile Broadband Driver can be exploited remotely to gain privileges.
  2. A remote code execution vulnerability in Windows Remote Desktop Services can be exploited remotely to execute arbitrary code.
  3. A remote code execution vulnerability in Windows Routing and Remote Access Service (RRAS) can be exploited remotely to execute arbitrary code.
  4. An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely to gain privileges.
  5. A denial of service vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to cause denial of service.
  6. A remote code execution vulnerability in Windows Lightweight Directory Access Protocol (LDAP) can be exploited remotely to execute arbitrary code.
  7. A remote code execution vulnerability in Input Method Editor (IME) can be exploited remotely to execute arbitrary code.
  8. An elevation of privilege vulnerability in Windows PrintWorkflowUserSvc can be exploited remotely to gain privileges.
  9. An information disclosure vulnerability in Windows Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to obtain sensitive information.
  10. An elevation of privilege vulnerability in Wireless Wide Area Network Service (WwanSvc) can be exploited remotely to gain privileges.
  11. An elevation of privilege vulnerability in WmsRepair Service can be exploited remotely to gain privileges.
  12. A remote code execution vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to execute arbitrary code.
  13. An elevation of privilege vulnerability in Windows Resilient File System (ReFS) can be exploited remotely to gain privileges.
  14. An elevation of privilege vulnerability in Windows Virtualization-Based Security (VBS) Enclave can be exploited remotely to gain privileges.
  15. A denial of service vulnerability in Windows Remote Desktop Gateway (RD Gateway) can be exploited remotely to cause denial of service.
  16. A remote code execution vulnerability in Lightweight Directory Access Protocol (LDAP) Client can be exploited remotely to execute arbitrary code.
  17. A remote code execution vulnerability in Windows Local Security Authority Subsystem Service (LSASS) can be exploited remotely to execute arbitrary code.
  18. A denial of service vulnerability in Windows Remote Desktop Services can be exploited remotely to cause denial of service.
  19. An elevation of privilege vulnerability in Windows Cloud Files Mini Filter Driver can be exploited remotely to gain privileges.
  20. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely to gain privileges.
  21. An information disclosure vulnerability in Windows Mobile Broadband Driver can be exploited remotely to obtain sensitive information.
  22. An elevation of privilege vulnerability in Windows Kernel-Mode Driver can be exploited remotely to gain privileges.
  23. An information disclosure vulnerability in Windows File Explorer can be exploited remotely to obtain sensitive information.
  24. An elevation of privilege vulnerability in Windows Task Scheduler can be exploited remotely to gain privileges.
  25. A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
  26. A remote code execution vulnerability in Windows IP Routing Management Snapin can be exploited remotely to execute arbitrary code.
  27. A denial of service vulnerability in Microsoft Message Queuing (MSMQ) can be exploited remotely to cause denial of service.
  28. A remote code execution vulnerability in Windows Domain Name Service can be exploited remotely to execute arbitrary code.
  29. A remote code execution vulnerability in Windows Hyper-V can be exploited remotely to execute arbitrary code.

Первичный источник обнаружения

Связанные продукты

Список CVE

  • CVE-2024-49083
    high
  • CVE-2024-49119
    high
  • CVE-2024-49104
    high
  • CVE-2024-49090
    high
  • CVE-2024-49077
    high
  • CVE-2024-49113
    high
  • CVE-2024-49106
    high
  • CVE-2024-49112
    critical
  • CVE-2024-49127
    high
  • CVE-2024-49089
    high
  • CVE-2024-49079
    high
  • CVE-2024-49097
    high
  • CVE-2024-49099
    warning
  • CVE-2024-49081
    high
  • CVE-2024-49107
    high
  • CVE-2024-49103
    warning
  • CVE-2024-49094
    high
  • CVE-2024-49116
    high
  • CVE-2024-49122
    high
  • CVE-2024-49093
    high
  • CVE-2024-49121
    high
  • CVE-2024-49076
    high
  • CVE-2024-49129
    high
  • CVE-2024-49124
    high
  • CVE-2024-49110
    high
  • CVE-2024-49120
    high
  • CVE-2024-49095
    high
  • CVE-2024-49132
    high
  • CVE-2024-49126
    high
  • CVE-2024-49075
    high
  • CVE-2024-49114
    high
  • CVE-2024-49111
    high
  • CVE-2024-49125
    high
  • CVE-2024-49118
    high
  • CVE-2024-49102
    high
  • CVE-2024-49084
    high
  • CVE-2024-49087
    warning
  • CVE-2024-49074
    high
  • CVE-2024-49078
    high
  • CVE-2024-49128
    high
  • CVE-2024-49082
    high
  • CVE-2024-49123
    high
  • CVE-2024-49098
    warning
  • CVE-2024-49092
    high
  • CVE-2024-49072
    high
  • CVE-2024-49105
    high
  • CVE-2024-49101
    high
  • CVE-2024-49109
    high
  • CVE-2024-49080
    high
  • CVE-2024-49088
    high
  • CVE-2024-49096
    high
  • CVE-2024-49091
    high
  • CVE-2024-49086
    high
  • CVE-2024-49115
    high
  • CVE-2024-49138
    high
  • CVE-2024-49073
    high
  • CVE-2024-49117
    high
  • CVE-2024-49108
    high
  • CVE-2024-49085
    high

Список KB

Смотрите также

Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com

Нашли неточность в описании этой уязвимости? Дайте нам знать!
Kaspersky IT Security Calculator:
Оцените ваш профиль кибербезопасности
Узнать больше
Встречай новый Kaspersky!
Каждая минута твоей онлайн-жизни заслуживает топовой защиты.
Узнать больше
Confirm changes?
Your message has been sent successfully.