mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
182 lines
6.2 KiB
JSON
182 lines
6.2 KiB
JSON
{
|
|
"id": "CVE-2024-43529",
|
|
"sourceIdentifier": "secure@microsoft.com",
|
|
"published": "2024-10-08T18:15:17.027",
|
|
"lastModified": "2024-10-16T21:48:07.683",
|
|
"vulnStatus": "Analyzed",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en el administrador de trabajos de impresi\u00f3n de Windows"
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV31": [
|
|
{
|
|
"source": "secure@microsoft.com",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "3.1",
|
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
|
"baseScore": 7.3,
|
|
"baseSeverity": "HIGH",
|
|
"attackVector": "LOCAL",
|
|
"attackComplexity": "LOW",
|
|
"privilegesRequired": "LOW",
|
|
"userInteraction": "REQUIRED",
|
|
"scope": "UNCHANGED",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"availabilityImpact": "HIGH"
|
|
},
|
|
"exploitabilityScore": 1.3,
|
|
"impactScore": 5.9
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "secure@microsoft.com",
|
|
"type": "Secondary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "CWE-822"
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-noinfo"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
|
|
"versionEndExcluding": "10.0.19044.5011",
|
|
"matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.19044.5011",
|
|
"matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
|
|
"versionEndExcluding": "10.0.19044.5011",
|
|
"matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
|
|
"versionEndExcluding": "10.0.19045.5011",
|
|
"matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.19045.5011",
|
|
"matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
|
|
"versionEndExcluding": "10.0.19045.5011",
|
|
"matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
|
|
"versionEndExcluding": "10.0.22000.3260",
|
|
"matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.22000.3260",
|
|
"matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
|
"versionEndExcluding": "10.0.22621.4317",
|
|
"matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.22621.4317",
|
|
"matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
|
"versionEndExcluding": "10.0.22631.4317",
|
|
"matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.22631.4317",
|
|
"matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
|
"versionEndExcluding": "10.0.26100.2033",
|
|
"matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
|
"versionEndExcluding": "10.0.26100.2033",
|
|
"matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.20348.2762",
|
|
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
|
"versionEndExcluding": "10.0.25398.1189",
|
|
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43529",
|
|
"source": "secure@microsoft.com",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
}
|
|
]
|
|
} |