CVE-2024-30065

Improper Link Resolution Before File Access ('Link Following') (CWE-59)

Published: Jun 11, 2024

010
CVSS 5.5EPSS 0.05%Medium
CVE info copied to clipboard

Summary

Windows Themes Denial of Service Vulnerability. This vulnerability occurs due to improper link resolution before file access in Windows Themes, which could allow an attacker to cause a system to crash or become unresponsive.

Impact

An authenticated attacker with low privileges on the system could run a specially crafted application to exploit this vulnerability. This could lead to a denial of service condition where the system crashes or stops responding. The vulnerability affects multiple versions of Windows, including Windows Server 2016, Windows 10 (versions 22H2, 1809, 1607, 1507), Windows Server 2019, Windows Server 2022, Windows Server 2012/2012 R2, Windows 11 (versions 22H2, 23H2, 21H2), and Windows Server 23H2.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

Yes, Microsoft has released patches for this vulnerability. Security updates are available for all affected Windows versions.

Mitigation

Apply the latest security updates from Microsoft to mitigate this issue. It is recommended to prioritize patching based on the criticality of the affected systems and the potential impact of a denial of service attack on your organization's operations.

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C

Timeline

Trending

This CVE stopped trending in security discussions

Jun 28, 2024 at 10:58 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 19%)

Nov 19, 2024 at 6:10 PM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_10_21H2
+null more

Patches

Microsoft
+null more

Links to Mitre Att&cks

T1547.009: Shortcut Modification
+null more

Attack Patterns

CAPEC-132: Symlink Attack
+null more

References

June 2024 Security Updates
June 2024 Security Updates
Windows Themes Denial of Service Vulnerability
CVE-2024-30065 Release: 2024-Jun Release Date: 2024-06-11T07:00:00Z Latest Revision Date: 2024-06-11T07:00:00Z Exploitability Publicly Disclosed: No Exploited: No Exploitability Assessment: Exploitation Less Likely CVSS Base Score: 5.5 Temporal Score: 4.8 Vector String: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C Security Updates Windows Server 2012 R2 (Server Core installation) Denial of Service Important 5039294 :

News

June 2024 Threat Advisory – Top 5
Successful exploitation of these vulnerabilities could result in Remote Code Execution, Elevation of Privilege, Information Disclosure and Denial of Service. Microsoft has released its Patch Tuesday for June 2024 with security updates for forty-nine flaws with 18 Remote Code Execution Vulnerabilities.
Microsoft’s Security Update Notification in June of High-Risk Vulnerabilities in Multiple Products - Security Boulevard
Recently, NSFOCUS CERT detected that Microsoft released a security update patch for June, which fixed 49 security issues involving widely used products such as Windows, Azure, Microsoft Office and Microsoft Visual Studio, including high-risk vulnerabilities such as privilege escalation and remote code execution. CVE-2024-35250: Untrusted pointer dereference vulnerability in Windows kernel mode driver; local attackers authenticated by ordinary users can exploit these vulnerabilities by running special programs to obtain SYSTEM permissions of the target system.
KLA68915
A remote code execution vulnerability in Windows Standards-Based Storage Management Service can be exploited remotely to execute arbitrary code. An elevation of privilege vulnerability in Microsoft Streaming Service can be exploited remotely to gain privileges.
CNNVD | 关于微软多个安全漏洞的通报
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063近日,微软官方发布了多个安全漏洞的公告,其中微软产品本身漏洞49个,影响到微软产品的其他厂商漏洞2个。包括Microso
CNNVD | 关于微软多个安全漏洞的通报
扫码订阅《中国信息安全》邮发代号 2-786征订热线:010-82341063近日,微软官方发布了多个安全漏洞的公告,其中微软产品本身漏洞49个,影响到微软产品的其他厂商漏洞2个。包括Microso
See 29 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:None
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI