Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
High
Attack Vector
Local
0

CVE-2024-26234

Disclosure Date: April 09, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Proxy Driver Spoofing Vulnerability

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
6.7 Medium
Impact Score:
5.9
Exploitability Score:
0.8
Vector:
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
High
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • Microsoft

Products

  • Windows 10 Version 1809,
  • Windows Server 2019,
  • Windows Server 2019 (Server Core installation),
  • Windows Server 2022,
  • Windows 11 version 21H2,
  • Windows 10 Version 21H2,
  • Windows 11 version 22H2,
  • Windows 10 Version 22H2,
  • Windows 11 version 22H3,
  • Windows 11 Version 23H2,
  • Windows Server 2022, 23H2 Edition (Server Core installation),
  • Windows 10 Version 1507,
  • Windows 10 Version 1607,
  • Windows Server 2016,
  • Windows Server 2016 (Server Core installation),
  • Windows Server 2008 Service Pack 2,
  • Windows Server 2008 Service Pack 2 (Server Core installation),
  • Windows Server 2008 Service Pack 2,
  • Windows Server 2008 R2 Service Pack 1,
  • Windows Server 2008 R2 Service Pack 1 (Server Core installation),
  • Windows Server 2012,
  • Windows Server 2012 (Server Core installation),
  • Windows Server 2012 R2,
  • Windows Server 2012 R2 (Server Core installation)

Additional Info

Technical Analysis