Uncontrolled Resource Consumption (CWE-400)
Windows Online Certificate Status Protocol (OCSP) Server is vulnerable to a denial of service attack. This vulnerability affects multiple versions of Windows Server, including Windows Server 2022, 2019, 2016, 2012 R2, 2012, and 2008 R2 SP1.
An attacker could exploit this vulnerability to cause a denial of service condition on the affected Windows OCSP Server. This could result in the temporary unavailability of the OCSP service, potentially disrupting certificate validation processes and affecting the security of network communications that rely on certificate status checking.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Patches are available. Microsoft has released security updates to address this vulnerability. The patches were made available on October 8, 2024.
1. Apply the security updates provided by Microsoft as soon as possible. 2. For Windows Server 2022, update to version 10.0.20348.2762 or later. 3. For Windows Server 2022 23H2, update to version 10.0.25398.1189 or later. 4. For Windows Server 2019, update to version 10.0.17763.6414 or later. 5. For Windows Server 2016, update to version 10.0.14393.7428 or later. 6. For Windows Server 2012 R2, 2012, and 2008 R2 SP1, apply the latest security updates. 7. Monitor OCSP Server performance and implement network-level protections to mitigate potential denial of service attacks while patches are being applied.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
A CVSS base score of 7.5 has been assigned.
Feedly found the first article mentioning CVE-2024-43545. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-43545
EPSS Score was set to: 0.05% (Percentile: 17.8%)
EPSS Score was set to: 0.06% (Percentile: 28.5%)