安全研究

安全漏洞
Microsoft Windows Routing and Remote Access Service远程代码执行漏洞(CVE-2024-38261)

发布日期:2024-10-08
更新日期:2024-10-09

受影响系统:
Microsoft Windows Server 2022, 23H2 Edition (Server Cor
Microsoft Windows Server 2022 (Server Core installation
Microsoft Windows Server 2022
Microsoft Windows Server 2019 (Server Core Installation
Microsoft Windows Server 2019
Microsoft Windows Server 2016 (Server Core Installation
Microsoft Windows Server 2016
Microsoft Windows Server 2012 R2 (Server Core installat
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012 (Server Core installation
Microsoft Windows Server 2012
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 R2 for x64-based Systems
Microsoft Windows Server 2008 for x64-based Systems Ser
Microsoft Windows Server 2008 for x64-based Systems Ser
Microsoft Windows Server 2008 for 32-bit Systems Servic
Microsoft Windows Server 2008 for 32-bit Systems Servic
描述:
CVE(CAN) ID: CVE-2024-38261

Microsoft Windows Routing and Remote Access Service是微软的Windows服务器系统所提供的服务组件,由Cisco编写,授权微软在其产品中使用。
Microsoft Windows Routing and Remote Access Service存在远程代码执行漏洞,攻击者可利用该漏洞在目标主机上执行代码。

<**>

建议:
厂商补丁:

Microsoft
---------
目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-38261

浏览次数:176
严重程度:0(网友投票)
本安全漏洞由绿盟科技翻译整理,版权所有,未经许可,不得转载
绿盟科技给您安全的保障