Buffer Over-read (CWE-126)
Microsoft Windows Admin Center is vulnerable to an information disclosure vulnerability. This vulnerability is related to a buffer over-read issue (CWE-126). The attack vector is network-based, requires low privileges and user interaction, and has a low attack complexity.
If successfully exploited, this vulnerability could lead to high impacts on confidentiality and availability, while integrity remains unaffected. An attacker could potentially access sensitive information and cause disruptions to system availability. The CVSS base score is 7.3, indicating a high severity level.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available for this vulnerability. Microsoft released the patch on September 10, 2024.
To mitigate this vulnerability, it is strongly recommended to apply the security update provided by Microsoft. The update can be obtained from the Microsoft Security Response Center (MSRC) update guide. Additionally, as the vulnerability requires user interaction, educating users about potential phishing or social engineering attacks that could exploit this vulnerability is advisable.
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (92169)
A CVSS base score of 7.3 has been assigned.
Feedly found the first article mentioning CVE-2024-43475. See article
NVD published the first details for CVE-2024-43475
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.05% (Percentile: 18.8%)
EPSS Score was set to: 0.04% (Percentile: 5.2%)