CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
no
Technical Impact
partial
[
{
"cpes": [
"cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.3447:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22H2:10.0.22621.3447:*:*:*:*:*:x64:*"
],
"vendor": "Microsoft",
"product": "Windows 11 version 22H2",
"versions": [
{
"status": "affected",
"version": "10.0.0",
"lessThan": "10.0.22621.3447",
"versionType": "custom"
}
],
"platforms": [
"ARM64-based Systems",
"x64-based Systems"
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.3447:*:*:*:*:*:arm64:*"
],
"vendor": "Microsoft",
"product": "Windows 11 version 22H3",
"versions": [
{
"status": "affected",
"version": "10.0.0",
"lessThan": "10.0.22631.3447",
"versionType": "custom"
}
],
"platforms": [
"ARM64-based Systems"
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_11_23H2:10.0.22631.3447:*:*:*:*:*:x64:*"
],
"vendor": "Microsoft",
"product": "Windows 11 Version 23H2",
"versions": [
{
"status": "affected",
"version": "10.0.0",
"lessThan": "10.0.22631.3447",
"versionType": "custom"
}
],
"platforms": [
"x64-based Systems"
]
},
{
"cpes": [
"cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.830:*:*:*:*:*:*:*"
],
"vendor": "Microsoft",
"product": "Windows Server 2022, 23H2 Edition (Server Core installation)",
"versions": [
{
"status": "affected",
"version": "10.0.0",
"lessThan": "10.0.25398.830",
"versionType": "custom"
}
],
"platforms": [
"x64-based Systems"
]
}
]
www.openwall.com/lists/oss-security/2024/06/04/2
www.openwall.com/lists/oss-security/2024/06/05/1
github.com/LeSuisse/nixpkgs/commit/81b82a2934521dffef76f7ca305d8d4e22fe7262
github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237.patch
github.com/libarchive/libarchive/releases/tag/v3.7.4
lists.fedoraproject.org/archives/list/[email protected]/message/EWANFZ6NEMXFCALXWI2AFKYBOLONAVFC/
lists.fedoraproject.org/archives/list/[email protected]/message/TWAMR5TY47UKVYMWQXB34CWSBNTRYMBV/
msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26256
www.openwall.com/lists/oss-security/2024/06/04/2
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
no
Technical Impact
partial