CVE-2024-43620

Heap-based Buffer Overflow (CWE-122)

Published: Nov 12, 2024

010
CVSS 8.8EPSS 0.09%High
CVE info copied to clipboard

Summary

Windows Telephony Service Remote Code Execution Vulnerability. This high-severity vulnerability affects the Windows Telephony Service, allowing for remote code execution. It has a CVSS base score of 8.8, indicating its critical nature. The vulnerability is network-based with low attack complexity and requires no privileges, but user interaction is necessary for exploitation. It is classified as a heap-based buffer overflow (CWE-122).

Impact

If successfully exploited, an attacker could execute arbitrary code on the target system with the same privileges as the Windows Telephony Service. The impact is severe across all security aspects: 1. Confidentiality: High impact - potential unauthorized access to sensitive information. 2. Integrity: High impact - possibility of data modification or corruption. 3. Availability: High impact - potential for system disruption or denial of service. Given that it's a network-based attack with low complexity, systems exposed to untrusted networks are at particular risk. The attacker could potentially gain control over the affected system, access sensitive data, modify information, or disrupt normal operations. The severity is amplified by the fact that the code execution occurs with service-level privileges, potentially allowing for significant system compromise.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Microsoft released an official fix for this vulnerability on November 12, 2024. Given the high severity of the vulnerability, it is crucial to prioritize the application of this patch to all affected systems as soon as possible.

Mitigation

1. Apply the official patch released by Microsoft immediately to all affected systems. 2. Implement network segmentation to limit exposure of systems running the Windows Telephony Service, especially from untrusted networks. 3. Educate users about the risks of interacting with untrusted content or connecting to unknown servers, as user interaction is required for exploitation. 4. Monitor for suspicious activities related to the Windows Telephony Service. 5. Implement the principle of least privilege to minimize potential impact if exploitation occurs. 6. Ensure all Windows systems and software are kept up to date with the latest security updates. 7. Consider disabling the Windows Telephony Service on systems where it's not required. 8. Use intrusion detection/prevention systems (IDS/IPS) to detect and block potential exploitation attempts. 9. Regularly audit and assess the security of systems running the Windows Telephony Service.

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92186)

Nov 12, 2024 at 7:53 AM
CVSS

A CVSS base score of 8.8 has been assigned.

Nov 12, 2024 at 5:55 PM / microsoft
First Article

Feedly found the first article mentioning CVE-2024-43620. See article

Nov 12, 2024 at 6:00 PM / Microsoft Security Advisories - MSRC
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 12, 2024 at 6:01 PM
CVE Assignment

NVD published the first details for CVE-2024-43620

Nov 12, 2024 at 6:15 PM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (210865)

Nov 13, 2024 at 2:15 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (210863)

Nov 13, 2024 at 2:15 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (210858)

Nov 13, 2024 at 2:15 AM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Nessus (210855)

Nov 13, 2024 at 2:15 AM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_10_1809
+null more

Patches

Microsoft
+null more

Attack Patterns

CAPEC-92: Forced Integer Overflow
+null more

References

Windows Telephony Service Remote Code Execution Vulnerability
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)

News

2024-45 - Adobe, Mozilla, Canonical, Red Hat, Microsoft, Google, Jenkins, GitHub, Spring 🗂️
Advisory Week Week 45, 2024 National Cyber Awareness System CISA Releases Nineteen Industrial Control Systems Advisories CISA Adds Two Known Exploited Vulnerabilities to Catalog Palo Alto Networks Emphasizes Hardening Guidance Fortinet Releases Security Updates for Multiple Products Microsoft Releases November 2024 Security Updates Adobe Releases Security Updates for Multiple Products Ivanti Releases Security Updates for Multiple Products JCDC’s Collaborative Efforts Enhance Cybersecurity for the 2024 Olympic and Paralympic Games Citrix Releases Security Updates for NetScaler and Citrix Session Recording CISA Releases Five Industrial Control Systems Advisories CISA, FBI, NSA, and International Partners Release Joint Advisory on 2023 Top Routinely Exploited Vulnerabilities CISA Adds Five Known Exploited Vulnerabilities to Catalog Adobe Security Bulletins and Advisories Security updates available for Adobe Photoshop APSB24-89 Security Updates Available for Adobe Commerce APSB24-90 Security Updates Available for Adobe Illustrator APSB24-66 APSB24-87 Security Update Available for Adobe InDesign APSB24-88 Security Updates Available for Adobe Bridge APSB24-77 Security Updates Available for Adobe Audition APSB24-83 Mozilla Security Advisories Security Vulnerabilities fixed in Thunderbird 132.0.1 mfsa2024-62 Security Vulnerabilities fixed in Thunderbird 128.4.3 mfsa2024-61 Ubuntu Security Notices Linux kernel vulnerabilities: USN-7089-6 / USN-7088-5 / USN-7089-5 / USN-7110-1 / USN-7089-4 / USN-7100-2 / USN-7100-1 GD Graphics Library vulnerability: USN-7112-1 Go vulnerabilities: USN-7111-1 / USN-7109-1 Linux kernel vulnerability:
Microsoft’s Security Update in November on High-Risk Vulnerabilities in Multiple Products
On November 13, NSFOCUS CERT detected that Microsoft released a security update patch for November, which fixed 89 security issues, including Windows, Microsoft SQL Server, Microsoft Office, Azure, Open Source Software, Microsoft Visual Studio, System Center and other widely used products, including high-risk vulnerabilities such as privilege escalation vulnerability and remote code execution vulnerability. Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Telephony Service Remote Code Execution Vulnerability
Windows Telephony Service Remote Code Execution Vulnerability
1.771
Atlassian Confluence Server CVE-2023-22505 Remote Code Execution Vulnerability Atlassian Confluence Server CVE-2023-22508 Remote Code Execution Vulnerability
Patch Tuesday November 2024 - 3 Zero Days!
So, without further ado, here’s the chart of MS patches that affect Windows platforms in the past month. Of this months patches only 8 are critical and 88 important.
See 31 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI