BDU:2024-06874MediumConfirmedExploit available
BDU
BDU
Data Bank of Information Security Threats
BDU ФСТЭК is the authoritative Russian source of vulnerability information, covering both international CVEs relevant to domestic software and unique Russian-disclosed issues. Entries contain severity, affected product lists (in Russian), and mitigation recommendations.
Region
RU
Updates
1 ч
License
Открытые данные
Russian federal catalog of vulnerabilities and threats maintained by FSTEC. Required for compliance with Russian information security regulations (Приказ №17, Приказ №21).
https://bdu.fstec.ru →Share link
Anyone with the link can open this vulnerability.
Уязвимость механизма Mark of the Web операционных систем Windows связана с нарушени…
CVSS
5.4
Medium
EPSS
0.00
p0
Published
2024-01-01
Updated
2024-01-01
Description
Уязвимость механизма Mark of the Web операционных систем Windows связана с нарушением механизма защиты данных. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, обойти существующие ограничения безопасности
Tags · CWE
Pre-auth
Affected products
Microsoft corp Windows_10Microsoft corp Windows_10 1607Microsoft corp Windows_10 1809Microsoft corp Windows_10 21h2Microsoft corp Windows_10 22h2Microsoft corp Windows_11 21h2Microsoft corp Windows_11 22h2Microsoft corp Windows_11 23h2Microsoft corp Windows_11 24h2Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2008Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2012Microsoft corp Windows_server_2016Microsoft corp Windows_server_2016Microsoft corp Windows_server_2019
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
Timeline
2024-01-01
Published
2024-01-01
Updated
CVSS 3.1 breakdown
Attack Vector
AV: N
Network (N)
Attack Complexity
AC: L
Low (L)
Privileges Required
PR: N
None (N)
User Interaction
UI: R
Required (R)
Scope
S: U
Unchanged (U)
Confidentiality Impact
C: N
None (N)
Integrity Impact
I: L
Low (L)
Availability Impact
A: L
Low (L)
Exploit indicators
EPSS
0.000 · p0
Known exploited (KEV)
No
Known exploits — Сканер-ВС
BDU:2024-06874
bdu_exploit · https://bdu.fstec.ru/vul
Affected software
| Product | Vendor | Status |
|---|---|---|
| windows_10 | microsoft corp | Tracked |
| windows_10 1607 | microsoft corp | Tracked |
| windows_10 1809 | microsoft corp | Tracked |
| windows_10 21h2 | microsoft corp | Tracked |
| windows_10 22h2 | microsoft corp | Tracked |
| windows_11 21h2 | microsoft corp | Tracked |
| windows_11 22h2 | microsoft corp | Tracked |
| windows_11 23h2 | microsoft corp | Tracked |
| windows_11 24h2 | microsoft corp | Tracked |
| windows_server_2008 | microsoft corp | Tracked |
| windows_server_2008 | microsoft corp | Tracked |
| windows_server_2008 | microsoft corp | Tracked |
| windows_server_2008 | microsoft corp | Tracked |
| windows_server_2012 | microsoft corp | Tracked |
| windows_server_2012 | microsoft corp | Tracked |
| windows_server_2012 | microsoft corp | Tracked |
| windows_server_2012 | microsoft corp | Tracked |
| windows_server_2016 | microsoft corp | Tracked |
| windows_server_2016 | microsoft corp | Tracked |
| windows_server_2019 | microsoft corp | Tracked |
Source databases
BDU
BDU
Data Bank of Information Security Threats
BDU ФСТЭК is the authoritative Russian source of vulnerability information, covering both international CVEs relevant to domestic software and unique Russian-disclosed issues. Entries contain severity, affected product lists (in Russian), and mitigation recommendations.
Region
RU
Updates
1 ч
License
Открытые данные
Russian federal catalog of vulnerabilities and threats maintained by FSTEC. Required for compliance with Russian information security regulations (Приказ №17, Приказ №21).
https://bdu.fstec.ru →MSR
MSR
Microsoft Security Response Center
The Security Update Guide is the source of truth for vulnerabilities in Microsoft products — KB article numbers, impacted builds and replacement patches. MSRC also assigns the MSRC-specific exploitability index used alongside CVSS.
Region
US
Updates
Patch Tuesday + ad-hoc
License
Proprietary
Microsoft's Security Update Guide, covering Windows, Office, Azure, SQL Server, Exchange and other first-party products.
https://msrc.microsoft.com/update-guide →Related vulnerabilities