Windows DNS Spoofing Vulnerability
History

Wed, 13 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 12 Nov 2024 18:00:00 +0000

Type Values Removed Values Added
Description Windows DNS Spoofing Vulnerability
Title Windows DNS Spoofing Vulnerability
First Time appeared Microsoft
Microsoft windows Server 2008 R2
Microsoft windows Server 2012
Microsoft windows Server 2012 R2
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
Weaknesses CWE-924
CPEs cpe:2.3:o:microsoft:windows_server_2008_R2:6.1.7601.27415:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.25165:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22267:*:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7515:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.6532:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2849:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2025:10.0.26100.2314:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_23h2:10.0.25398.1251:*:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft windows Server 2008 R2
Microsoft windows Server 2012
Microsoft windows Server 2012 R2
Microsoft windows Server 2016
Microsoft windows Server 2019
Microsoft windows Server 2022
Microsoft windows Server 2025
Microsoft windows Server 23h2
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2024-11-12T17:53:48.450Z

Updated: 2024-11-13T23:17:14.043Z

Reserved: 2024-08-14T01:08:33.514Z

Link: CVE-2024-43450

cve-icon Vulnrichment

Updated: 2024-11-13T16:15:16.828Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-12T18:15:22.237

Modified: 2024-11-13T17:01:58.603

Link: CVE-2024-43450

cve-icon Redhat

No data.