目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2024-35250— Microsoft Windows Kernel Mode Drivers 安全漏洞

CVSS 7.8 · High KEV EPSS 56.83% · P98
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2024-35250の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
ソース: NVD (National Vulnerability Database)
脆弱性説明
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
非可信指针解引用
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Microsoft Windows Kernel Mode Drivers 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Microsoft Windows Kernel Mode Drivers是美国微软(Microsoft)公司的Windows内核模式驱动。 Microsoft Windows Kernel Mode Drivers存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

Shenlong 10 Questions — AI 深度分析

十问解析:根本原因、利用方式、修复建议、紧迫性。摘要免费,完整版需登录。

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
MicrosoftWindows 10 Version 1809 10.0.17763.0 ~ 10.0.17763.5936 -
MicrosoftWindows 10 Version 1809 10.0.0 ~ 10.0.17763.5936 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.5936 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.5936 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.2527 -
MicrosoftWindows 11 version 21H2 10.0.22000.0 ~ 10.0.22000.3019 -
MicrosoftWindows 10 Version 21H2 10.0.19044.0 ~ 10.0.19044.4529 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.3737 -
MicrosoftWindows 10 Version 22H2 10.0.19045.0 ~ 10.0.19045.4529 -
MicrosoftWindows 11 version 22H3 10.0.22631.0 ~ 10.0.22631.3737 -
MicrosoftWindows 11 Version 23H2 10.0.22631.0 ~ 10.0.22631.3737 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.950 -
MicrosoftWindows 10 Version 1507 10.0.10240.0 ~ 10.0.10240.20680 -
MicrosoftWindows 10 Version 1607 10.0.14393.0 ~ 10.0.14393.7070 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.7070 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.7070 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.22720 -
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.6003.0 ~ 6.0.6003.22720 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.22720 -
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.7601.0 ~ 6.1.7601.27170 -
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.1.7601.0 ~ 6.1.7601.27170 -
MicrosoftWindows Server 2012 6.2.9200.0 ~ 6.2.9200.24919 -
MicrosoftWindows Server 2012 (Server Core installation) 6.2.9200.0 ~ 6.2.9200.24919 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.22023 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.22023 -

II. CVE-2024-35250の公開POC

#POC説明ソースリンクShenlongリンク
1PoC for the Untrusted Pointer Dereference in the ks.sys driverhttps://github.com/varwara/CVE-2024-35250POC詳細
2Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。) https://github.com/0xjiefeng/CVE-2024-35250-BOFPOC詳細
3Cobalt Strike 的 CVE-2024-35250 的 BOF。(请给我加个星,谢谢。) https://github.com/ro0tmylove/CVE-2024-35250-BOFPOC詳細
4CVE-2024-35250 的 Beacon Object File (BOF) 实现。https://github.com/yinsel/CVE-2024-35250-BOFPOC詳細
5CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoChttps://github.com/Brentlyw/GiveMeKernelPOC詳細
6CVE-2024-35250 PoC - Optimized & Condensed Form of Varwara's PoChttps://github.com/0xROOTPLS/GiveMeKernelPOC詳細
7PoC for the Untrusted Pointer Dereference in the ks.sys driverhttps://github.com/CrackerCat/CVE-2024-35250POC詳細
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2024-35250のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Microsoft · 2024-06-11 · 49 CVEs total

CVE-2024-300809.8 CRITICALMicrosoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-300978.8 HIGHMicrosoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerabil
CVE-2024-301038.8 HIGHMicrosoft Outlook Remote Code Execution Vulnerability
CVE-2024-300688.8 HIGHWindows Kernel Elevation of Privilege Vulnerability
CVE-2024-300648.8 HIGHWindows Kernel Elevation of Privilege Vulnerability
CVE-2024-300788.8 HIGHWindows Wi-Fi Driver Remote Code Execution Vulnerability
CVE-2024-352498.8 HIGHMicrosoft Dynamics 365 Business Central Remote Code Execution Vulnerability
CVE-2024-373258.1 HIGHAzure Science Virtual Machine (DSVM) Elevation of Privilege Vulnerability
CVE-2024-300778.0 HIGHWindows OLE Remote Code Execution Vulnerability
CVE-2024-300748.0 HIGHWindows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
CVE-2024-300758.0 HIGHWindows Link Layer Topology Discovery Protocol Remote Code Execution Vulnerability
CVE-2024-300917.8 HIGHWin32k Elevation of Privilege Vulnerability
CVE-2024-300897.8 HIGHMicrosoft Streaming Service Elevation of Privilege Vulnerability
CVE-2024-300957.8 HIGHWindows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-301007.8 HIGHMicrosoft SharePoint Server Remote Code Execution Vulnerability
CVE-2024-300947.8 HIGHWindows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-300727.8 HIGHMicrosoft Event Trace Log File Parsing Remote Code Execution Vulnerability
CVE-2024-300877.8 HIGHWin32k Elevation of Privilege Vulnerability
CVE-2024-300827.8 HIGHWin32k Elevation of Privilege Vulnerability
CVE-2024-300867.8 HIGHWindows Win32 Kernel Subsystem Elevation of Privilege Vulnerability

Showing 20 of 49 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2024-35250へのコメント

まだコメントはありません


コメントを残す