Out-of-bounds Read (CWE-125)
A vulnerability in Windows Network Address Translation (NAT) could allow an attacker to cause a Denial of Service condition. This is an out-of-bounds read vulnerability, which could lead to uncontrolled resource consumption.
An attacker exploiting this vulnerability could cause a denial of service condition in the Windows Network Address Translation (NAT) service. This would potentially disrupt network connectivity and services relying on NAT, impacting the availability of affected systems. The vulnerability has a high availability impact, indicating that it could significantly disrupt normal operations of the affected systems.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Patches are available for this vulnerability. Microsoft has released updates to address this issue across multiple versions of Windows, including Windows 10, Windows 11, and Windows Server versions.
To mitigate this vulnerability, it is strongly recommended to apply the latest security updates provided by Microsoft. Specific version numbers to update to include: 1. Windows 11 24H2: Update to version 10.0.26100.2033 or later 2. Windows 11 21H2: Update to version 10.0.22000.3260 or later 3. Windows 10 22H2: Update to version 10.0.19045.5011 or later 4. Windows Server 2019: Update to version 10.0.17763.6414 or later 5. Windows 11 22H2: Update to version 10.0.22621.4317 or later 6. Windows Server 2022 23H2: Update to version 10.0.25398.1189 or later 7. Windows Server 2016: Update to version 10.0.14393.7428 or later 8. Windows 10 21H2: Update to version 10.0.19044.5011 or later 9. Windows Server 2022: Update to version 10.0.20348.2762 or later 10. Windows 10 1507: Update to version 10.0.10240.20796 or later 11. Windows 11 23H2: Update to version 10.0.22631.4317 or later Additionally, monitor network traffic and implement network segmentation to limit potential impact. Ensure that only necessary ports and services are exposed to untrusted networks.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
A CVSS base score of 7.5 has been assigned.
Feedly found the first article mentioning CVE-2024-43562. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-43562
EPSS Score was set to: 0.05% (Percentile: 17.8%)
EPSS Score was set to: 0.06% (Percentile: 28.5%)