V
Scaner-VSvulnerability catalog · v4.2
BDU:2024-03546
BDU
High

Уязвимость службы DHCP-сервера операционных систем Windows связана с неконтрол…

CVSS
7.5
High
EPSS
0.00
p0
Published
2024-01-01
Updated
2024-01-01
Description

Уязвимость службы DHCP-сервера операционных систем Windows связана с неконтролируемым расходом ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании

Tags · CWE
Pre-auth
Affected products
Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2016Microsoft corp Windows_server_2016Microsoft corp Windows_server_2019Microsoft corp Windows_server_2019Microsoft corp Windows_server_2022Microsoft corp Windows_server_2022Microsoft corp Windows_server_2022,Microsoft WindowsMicrosoft WindowsMicrosoft WindowsMicrosoft WindowsMicrosoft Windows
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Timeline
2024-01-01
Published
2024-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: N
None (N)
User Interaction
UI: N
None (N)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: N
None (N)
Integrity Impact
I: N
None (N)
Availability Impact
A: H
High (H)
Exploit indicators
EPSS
0.000 · p0
Known exploited (KEV)
No
Known exploits — Сканер-ВС
No Сканер-ВС checks registered for this vulnerability yet.
Affected software
ProductVendorStatus
windows_server_2008microsoft corpTracked
windows_server_2008microsoft corpTracked
windows_server_2008microsoft corpTracked
windows_server_2008microsoft corpTracked
windows_server_2012microsoft corpTracked
windows_server_2012microsoft corpTracked
windows_server_2012microsoft corpTracked
windows_server_2012microsoft corpTracked
windows_server_2016microsoft corpTracked
windows_server_2016microsoft corpTracked
windows_server_2019microsoft corpTracked
windows_server_2019microsoft corpTracked
windows_server_2022microsoft corpTracked
windows_server_2022microsoft corpTracked
windows_server_2022,microsoft corpTracked
WindowsMicrosoftTracked
WindowsMicrosoftTracked
WindowsMicrosoftTracked
WindowsMicrosoftTracked
WindowsMicrosoftTracked