Language:
Severity: Critical
ID: 200352
File Name: smb_nt_ms24_jun_5039236.nasl
Version: 1.13
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 6/11/2024
Updated: 12/17/2024
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.5
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2024-30097
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.4
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CVSS Score Source: CVE-2024-30080
CPE: cpe:/o:microsoft:windows_11_22h2, cpe:/o:microsoft:windows_server_23h2
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 6/11/2024
Vulnerability Publication Date: 2/13/2024
CISA Known Exploited Vulnerability Due Dates: 9/3/2024, 11/5/2024, 1/6/2025
Metasploit (Windows Access Mode Mismatch LPE in ks.sys)
CVE: CVE-2023-50868, CVE-2024-30063, CVE-2024-30064, CVE-2024-30065, CVE-2024-30066, CVE-2024-30067, CVE-2024-30068, CVE-2024-30069, CVE-2024-30072, CVE-2024-30076, CVE-2024-30077, CVE-2024-30078, CVE-2024-30080, CVE-2024-30082, CVE-2024-30084, CVE-2024-30085, CVE-2024-30086, CVE-2024-30087, CVE-2024-30088, CVE-2024-30089, CVE-2024-30090, CVE-2024-30091, CVE-2024-30093, CVE-2024-30094, CVE-2024-30095, CVE-2024-30096, CVE-2024-30097, CVE-2024-30099, CVE-2024-35250, CVE-2024-38213