8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
48.7%
Multiple vulnerabilities were found in Microsoft System Center. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code.
Below is a complete list of vulnerabilities:
CVE-2024-21324 high
CVE-2024-29055 high
CVE-2024-21323 high
CVE-2024-29054 high
CVE-2024-29053 high
CVE-2024-21322 high
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21322
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21323
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21324
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29053
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29054
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29055
statistics.securelist.com/
threats.kaspersky.com/en/product/Microsoft-Defender-for-IoT/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
9 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
48.7%