MSRC compact vulnerability detail

CVE-2024-30013 · Windows MultiPoint Services Remote Code Execution Vulnerability

No description was published by MSRC.

Severity
Important
Impact
Remote Code Execution
CVSS
8.8 base · 7.7 temporal
Release
2024-07-09
Signals
Windows MultiPoint Services Remote Code Execution Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
FAQ
How could an attacker exploit this vulnerability? An unauthenticated attacker can exploit this vulnerability by sending a malicious request packet via a client machine to a Windows Server configured to be a Multipoint Service over a network, and then waiting for the server to stop or restart.
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do? Exploitation of the vulnerability requires an admin user to stop or restart the service.