Lucene search

K
vulnrichmentMicrosoftVULNRICHMENT:CVE-2024-30010
HistoryMay 14, 2024 - 4:57 p.m.

CVE-2024-30010 Windows Hyper-V Remote Code Execution Vulnerability

2024-05-1416:57:08
CWE-23
microsoft
github.com
9
windows hyper-v
cve-2024-30010
remote code execution

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

CNA Affected

[
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.5820:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2019",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.17763.5820",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.5820:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2019 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.17763.5820",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2461:*:*:*:*:*:*:*",
      "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2458:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2022",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.20348.2461",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.20348.2458",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.887:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2022, 23H2 Edition (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.25398.887",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6981:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2016",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.14393.6981",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.6981:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2016 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.14393.6981",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24868:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2012",
    "versions": [
      {
        "status": "affected",
        "version": "6.2.0",
        "lessThan": "6.2.9200.24868",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24868:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2012 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "6.2.0",
        "lessThan": "6.2.9200.24868",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21972:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2012 R2",
    "versions": [
      {
        "status": "affected",
        "version": "6.3.0",
        "lessThan": "6.3.9600.21972",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.21972:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2012 R2 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "6.3.0",
        "lessThan": "6.3.9600.21972",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

AI Score

6.8

Confidence

Low

EPSS

0

Percentile

9.0%

SSVC

Exploitation

none

Automatable

no

Technical Impact

total