BDU:2023-02177HighConfirmedExploit available
BDU
BDU
Data Bank of Information Security Threats
BDU ФСТЭК is the authoritative Russian source of vulnerability information, covering both international CVEs relevant to domestic software and unique Russian-disclosed issues. Entries contain severity, affected product lists (in Russian), and mitigation recommendations.
Region
RU
Updates
1 ч
License
Открытые данные
Russian federal catalog of vulnerabilities and threats maintained by FSTEC. Required for compliance with Russian information security regulations (Приказ №17, Приказ №21).
https://bdu.fstec.ru →Share link
Anyone with the link can open this vulnerability.
Уязвимость реализации протокола Kerberos операционных систем Windows связана с н…
CVSS
8.1
High
EPSS
0.00
p0
Published
2023-01-01
Updated
2023-01-01
Description
Уязвимость реализации протокола Kerberos операционных систем Windows связана с небезопасным использованием алгоритма шифрования RC4 с хеш-функцией MD4. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, реализовать атаку «человек посередине» и повысить свои привилегии
Tags · CWE
Pre-auth
Affected products
Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2016Microsoft corp Windows_server_2016Microsoft corp Windows_server_2019Microsoft corp Windows_server_2019Microsoft corp Windows_server_2022Microsoft corp Windows_server_2022Microsoft WindowsMicrosoft WindowsMicrosoft WindowsMicrosoft WindowsMicrosoft WindowsMicrosoft Windows
CVSS vector
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Timeline
2023-01-01
Published
2023-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: H
High (H)
Privileges Required
PR: N
None (N)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: H
High (H)
Integrity Impact
I: H
High (H)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.000 · p0
Known exploited (KEV)
No
Known exploits — Сканер-ВС
CVE-2023-28244
github-poc · https://github.com/sk3w/cve-2023-28244
Affected software
| Product | Vendor | Status |
|---|---|---|
| windows_server_2008 | microsoft corp | Tracked |
| windows_server_2008 | microsoft corp | Tracked |
| windows_server_2008 | microsoft corp | Tracked |
| windows_server_2008 | microsoft corp | Tracked |
| windows_server_2012 | microsoft corp | Tracked |
| windows_server_2012 | microsoft corp | Tracked |
| windows_server_2012 | microsoft corp | Tracked |
| windows_server_2012 | microsoft corp | Tracked |
| windows_server_2016 | microsoft corp | Tracked |
| windows_server_2016 | microsoft corp | Tracked |
| windows_server_2019 | microsoft corp | Tracked |
| windows_server_2019 | microsoft corp | Tracked |
| windows_server_2022 | microsoft corp | Tracked |
| windows_server_2022 | microsoft corp | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
| Windows | Microsoft | Tracked |
Source databases
BDU
BDU
Data Bank of Information Security Threats
BDU ФСТЭК is the authoritative Russian source of vulnerability information, covering both international CVEs relevant to domestic software and unique Russian-disclosed issues. Entries contain severity, affected product lists (in Russian), and mitigation recommendations.
Region
RU
Updates
1 ч
License
Открытые данные
Russian federal catalog of vulnerabilities and threats maintained by FSTEC. Required for compliance with Russian information security regulations (Приказ №17, Приказ №21).
https://bdu.fstec.ru →MSR
MSR
Microsoft Security Response Center
The Security Update Guide is the source of truth for vulnerabilities in Microsoft products — KB article numbers, impacted builds and replacement patches. MSRC also assigns the MSRC-specific exploitability index used alongside CVSS.
Region
US
Updates
Patch Tuesday + ad-hoc
License
Proprietary
Microsoft's Security Update Guide, covering Windows, Office, Azure, SQL Server, Exchange and other first-party products.
https://msrc.microsoft.com/update-guide →Related vulnerabilities