MSRC compact vulnerability detail

CVE-2024-26220 · Windows Mobile Hotspot Information Disclosure Vulnerability

No description was published by MSRC.

Severity
Important
Impact
Information Disclosure
CVSS
5.0 base · 4.4 temporal
Release
2024-04-09
Signals
Windows Mobile Hotspot Information Disclosure Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
FAQ
What type of information could be disclosed by this vulnerability? The type of information that could be disclosed if an attacker successfully exploited this vulnerability is uninitialized memory.
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires a user to first turn on the Mobile Hotspot before the attacker starts the exploitation.
FAQ
According to the CVSS metric, user interaction is required (UI:R) and privileges required is Low (PR:L). What does that mean for this vulnerability? An authorized attacker with guest/low privileges must first gain access to the local system, then wait for or trick the user into turning on the Mobile Hotspot feature. Only when the Mobile Hotspot is turned on does the vulnerability become exploitable. Therefore, this attack vector requires both attacker authentication (to access the local system) and user interaction (to turn on the Mobile Hotspot).