MSRC compact vulnerability detail

CVE-2024-21357 · Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability

No description was published by MSRC.

Severity
Critical
Impact
Remote Code Execution
CVSS
8.1 base · 7.1 temporal
Release
2024-02-13
Signals
Windows Internet Connection Sharing (ICS) Remote Code Execution Exploited: No Publicly disclosed: No Exploitability: Exploitation More Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability? Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
FAQ
According to the CVSS score, the attack vector is network (AV:N). What does this mean for this vulnerability? Windows Pragmatic General Multicast (PGM) produces multicast traffic that runs on layer 4 and is routable. Therefore this vulnerability can be exploited over the network.
FAQ
How could an attacker exploit this vulnerability? An attacker could exploit this vulnerability by sending specially crafted malicious traffic to a vulnerable server.