Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2024-38262 |
CWE-ID | CWE-591 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Windows Server Operating systems & Components / Operating system |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU98274
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-38262
CWE-ID:
CWE-591 - Sensitive Data Storage in Improperly Locked Memory
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the system.
The vulnerability exists due to sensitive data storage in improperly locked memory in Windows Remote Desktop Licensing Service. A remote user can execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows Server: before 2008 R2 6.1.7601.27366, 2008 6.0.6003.22918, 2012 R2 6.3.9600.22221, 2012 6.2.9200.25118, 2016 10.0.14393.7428, 2019 10.0.17763.6414, 2022 10.0.20348.2762, 2022 23H2 10.0.25398.1189, 2008 R2 6.1.7601.27366, 2008 R2 6.1.7601.27366, 2008 R2 6.1.7601.27366, 2008 R2 6.1.7601.27366
CPE2.3 External linkshttp://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38262
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.