CVE-2024-43450

Improper Enforcement of Message Integrity During Transmission in a Communication Channel (CWE-924)

Published: Nov 12, 2024

010
CVSS 7.5EPSS 0.09%High
CVE info copied to clipboard

Summary

Windows DNS Spoofing Vulnerability. This vulnerability has a high impact on integrity, availability, and confidentiality. It requires user interaction and can be exploited over a network, although the attack complexity is high. No privileges are required to exploit this vulnerability.

Impact

This vulnerability could allow an attacker to perform DNS spoofing attacks, potentially redirecting network traffic to malicious sites. The high impact on integrity, confidentiality, and availability suggests that successful exploitation could lead to unauthorized data modification, information disclosure, and service disruptions. Given the need for user interaction, attacks might involve social engineering tactics to trick users into taking specific actions that trigger the vulnerability.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Microsoft released a security update on November 12, 2024, to address this vulnerability.

Mitigation

1. Apply the security update provided by Microsoft as soon as possible. 2. Implement network segmentation and access controls to limit potential attack vectors. 3. Educate users about the risks of interacting with suspicious network requests or links. 4. Monitor DNS traffic for unusual patterns that might indicate spoofing attempts. 5. Consider implementing DNSSEC (Domain Name System Security Extensions) to add an extra layer of authentication to DNS queries and responses.

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92186)

Nov 12, 2024 at 7:53 AM
CVSS

A CVSS base score of 7.5 has been assigned.

Nov 12, 2024 at 5:55 PM / microsoft
First Article

Feedly found the first article mentioning CVE-2024-43450. See article

Nov 12, 2024 at 6:00 PM / Microsoft Security Advisories - MSRC
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 12, 2024 at 6:02 PM
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 12, 2024 at 6:13 PM
CVE Assignment

NVD published the first details for CVE-2024-43450

Nov 12, 2024 at 6:15 PM
EPSS

EPSS Score was set to: 0.09% (Percentile: 40.2%)

Nov 13, 2024 at 5:06 PM
Trending

This CVE started to trend in security discussions

Nov 13, 2024 at 6:09 PM
Trending

This CVE stopped trending in security discussions

Nov 16, 2024 at 12:23 AM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_server_2019
+null more

Patches

Microsoft
+null more

References

Windows DNS Spoofing Vulnerability
According to the CVSS metric, the attack complexity is high (AC:H). According to the CVSS metric, user interaction is required (UI:R) and privileges required are none (PR:N).

News

cveNotify : 🚨 CVE-2024-43450Windows DNS Spoofing Vulnerability🎖@cveNotify
cveNotify : 🚨 CVE-2024-43450Windows DNS Spoofing Vulnerability🎖@cveNotify
2024-45 - Adobe, Mozilla, Canonical, Red Hat, Microsoft, Google, Jenkins, GitHub, Spring 🗂️
Advisory Week Week 45, 2024 National Cyber Awareness System CISA Releases Nineteen Industrial Control Systems Advisories CISA Adds Two Known Exploited Vulnerabilities to Catalog Palo Alto Networks Emphasizes Hardening Guidance Fortinet Releases Security Updates for Multiple Products Microsoft Releases November 2024 Security Updates Adobe Releases Security Updates for Multiple Products Ivanti Releases Security Updates for Multiple Products JCDC’s Collaborative Efforts Enhance Cybersecurity for the 2024 Olympic and Paralympic Games Citrix Releases Security Updates for NetScaler and Citrix Session Recording CISA Releases Five Industrial Control Systems Advisories CISA, FBI, NSA, and International Partners Release Joint Advisory on 2023 Top Routinely Exploited Vulnerabilities CISA Adds Five Known Exploited Vulnerabilities to Catalog Adobe Security Bulletins and Advisories Security updates available for Adobe Photoshop APSB24-89 Security Updates Available for Adobe Commerce APSB24-90 Security Updates Available for Adobe Illustrator APSB24-66 APSB24-87 Security Update Available for Adobe InDesign APSB24-88 Security Updates Available for Adobe Bridge APSB24-77 Security Updates Available for Adobe Audition APSB24-83 Mozilla Security Advisories Security Vulnerabilities fixed in Thunderbird 132.0.1 mfsa2024-62 Security Vulnerabilities fixed in Thunderbird 128.4.3 mfsa2024-61 Ubuntu Security Notices Linux kernel vulnerabilities: USN-7089-6 / USN-7088-5 / USN-7089-5 / USN-7110-1 / USN-7089-4 / USN-7100-2 / USN-7100-1 GD Graphics Library vulnerability: USN-7112-1 Go vulnerabilities: USN-7111-1 / USN-7109-1 Linux kernel vulnerability:
What happens to CISA now? Is deterrence in cyber possible?
Three Buddy Problem – Episode 21 : We dig into an incredible government report on Iranian hacking group Emennet Pasargad and tradecraft during the Israel/Hamas war, why Predatory Sparrow could have been aimed at deterrence in cyber, and the FBI/CISA public confirmation of the mysterious Salt Typhoon hacks. Plus, discussion on hina’s cyber capabilities, the narrative around “pre-positioning” for a Taiwan conflict, the blending of cyber and kinetic operations, and the long tail of Chinese researchers reporting Microsoft Windows vulnerabilities. The future of CISA is a recurring theme throughout this episode with some speculation about what happens to the agency under the Trump administration. Cast: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh) and Ryan Naraine (SecurityWeek). Links: Transcript (unedited, AI-generated) CISA/Israel gov report on Iranian hacking operations Check Point: A deep-dive of Iran’s WezRat malware Trend Micro report on Earth Estries FBI/CISA on China hacking US telcos US accuses China of vast cyberespionage against telecoms Volt Typhoon hackers hit SingTel in Singapore New Palo Alto firewall 0day attack CVE-2024-43450 – China reports Windows DNS Spoofing vuln The post What happens to CISA now? Is deterrence in cyber possible?
Microsoft’s Security Update in November on High-Risk Vulnerabilities in Multiple Products
On November 13, NSFOCUS CERT detected that Microsoft released a security update patch for November, which fixed 89 security issues, including Windows, Microsoft SQL Server, Microsoft Office, Azure, Open Source Software, Microsoft Visual Studio, System Center and other widely used products, including high-risk vulnerabilities such as privilege escalation vulnerability and remote code execution vulnerability. Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
1.771
Atlassian Confluence Server CVE-2023-22505 Remote Code Execution Vulnerability Atlassian Confluence Server CVE-2023-22508 Remote Code Execution Vulnerability
See 28 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:High
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI