MSRC compact vulnerability detail

CVE-2021-24074 · Windows TCP/IP Remote Code Execution Vulnerability

No description was published by MSRC.

Severity
n/a
Impact
n/a
CVSS
9.8 base · 8.5 temporal
Release
2021-02-09
Signals
Windows TCP/IP Unknown impact Exploited: No Publicly disclosed: No Exploitability: Exploitation More Likely
CWE
No CWE data published.
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
Workaround
1. Set sourceroutingbehavior to "drop" Use the following command: netsh int ipv4 set global sourceroutingbehavior=drop For more information about ipv4 registry settings see Additional Registry Settings Impact of workaround IPv4 Source routing is considered insecure and is blocked by default in Windows; however, a system will process the request and return an ICMP message denying the request. The workaround will cause the system to drop these requests altogether without any processing. How to undo the workaround To restore to default setting "Dontforward": netsh int ipv4 set global sourceroutingbehavior=dontforward 2. Configure firewall or load balancers to disallow source routing requests
FAQ
Where can I find more information about this vulnerability? Please see MSRC Blog regarding the TCP/IP vulnerabilities discussed in CVE-2021-24074, CVE-2021-24086, and CVE-2021-24094.