Language:
Severity: Critical
ID: 210866
File Name: smb_nt_ms24_nov_5046616.nasl
Version: 1.5
Type: local
Agent: windows
Family: Windows : Microsoft Bulletins
Published: 11/12/2024
Updated: 12/13/2024
Supported Sensors: Nessus Agent, Nessus
Risk Factor: Critical
Score: 9.9
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2024-43639
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/o:microsoft:windows_server_2022, cpe:/o:microsoft:azure_stack_hci:22h2
Required KB Items: SMB/MS_Bulletin_Checks/Possible
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 11/12/2024
Vulnerability Publication Date: 11/12/2024
CISA Known Exploited Vulnerability Due Dates: 12/3/2024
CVE: CVE-2024-38203, CVE-2024-43447, CVE-2024-43449, CVE-2024-43450, CVE-2024-43451, CVE-2024-43452, CVE-2024-43530, CVE-2024-43620, CVE-2024-43621, CVE-2024-43622, CVE-2024-43623, CVE-2024-43624, CVE-2024-43625, CVE-2024-43626, CVE-2024-43627, CVE-2024-43628, CVE-2024-43629, CVE-2024-43630, CVE-2024-43631, CVE-2024-43634, CVE-2024-43635, CVE-2024-43636, CVE-2024-43637, CVE-2024-43638, CVE-2024-43639, CVE-2024-43640, CVE-2024-43641, CVE-2024-43642, CVE-2024-43643, CVE-2024-43644, CVE-2024-43646, CVE-2024-49019, CVE-2024-49039, CVE-2024-49046