CVE-2024-43611 (CNNVD-202410-737)

HIGH
中文标题:
Microsoft Windows Routing and Remote Access Service 安全漏洞
英文标题:
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVSS分数: 8.8
发布时间: 2024-10-08 17:36:18
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Microsoft Windows Routing and Remote Access Service是美国微软(Microsoft)公司的一种网络服务,用于实现网络路由、虚拟专用网络(VPN)和拨号连接等功能。 Microsoft Windows Routing and Remote Access Service存在安全漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows Server 2022,Windows Server 2022 (Server Core installation),Windows Server 2022, 23H2 Edition (Server Core installation),Windows Server 2016,Windows Server 2016 (Server Core installation),Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows Server 2012 R2 (Server Core installation)。

英文描述:

NOT_EXTRACTED

CWE类型:
CWE-20 CWE-122
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Microsoft Windows Server 2019 - < 10.0.17763.6414 - cpe:2.3:a:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
Microsoft Windows Server 2019 (Server Core installation) - < 10.0.17763.6414 - cpe:2.3:a:microsoft:windows_server_2019_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2022 - < 10.0.20348.2762 - cpe:2.3:a:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
Microsoft Windows Server 2022, 23H2 Edition (Server Core installation) - < 10.0.25398.1189 - cpe:2.3:a:microsoft:windows_server_2022,_23h2_edition_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2016 - < 10.0.14393.7428 - cpe:2.3:a:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
Microsoft Windows Server 2016 (Server Core installation) - < 10.0.14393.7428 - cpe:2.3:a:microsoft:windows_server_2016_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 Service Pack 2 - < 6.0.6003.22918 - cpe:2.3:a:microsoft:windows_server_2008_service_pack_2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 Service Pack 2 (Server Core installation) - < 6.0.6003.22918 - cpe:2.3:a:microsoft:windows_server_2008_service_pack_2_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 Service Pack 2 - < 6.0.6003.22918 - cpe:2.3:a:microsoft:windows_server_2008__service_pack_2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 Service Pack 1 - < 6.1.7601.27366 - cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1:*:*:*:*:*:*:*:*
Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation) - < 6.1.7601.27366 - cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 - < 6.2.9200.25118 - cpe:2.3:a:microsoft:windows_server_2012:*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 (Server Core installation) - < 6.2.9200.25118 - cpe:2.3:a:microsoft:windows_server_2012_(server_core_installation):*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 R2 - < 6.3.9600.22221 - cpe:2.3:a:microsoft:windows_server_2012_r2:*:*:*:*:*:*:*:*
Microsoft Windows Server 2012 R2 (Server Core installation) - < 6.3.9600.22221 - cpe:2.3:a:microsoft:windows_server_2012_r2_(server_core_installation):*:*:*:*:*:*:*:*
microsoft windows_server_2008 - - - cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*
microsoft windows_server_2008 r2 - - cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
microsoft windows_server_2012 - - - cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*
microsoft windows_server_2012 r2 - - cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
microsoft windows_server_2016 * - - cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*
microsoft windows_server_2019 * - - cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
microsoft windows_server_2022 * - - cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
microsoft windows_server_2022_23h2 * - - cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability vendor-advisory
cve.org
访问
CVSS评分详情
3.1 (cna)
HIGH
8.8
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
机密性
HIGH
完整性
HIGH
可用性
HIGH
时间信息
发布时间:
2024-10-08 17:36:18
修改时间:
2025-07-08 15:39:37
创建时间:
2025-11-11 15:39:36
更新时间:
2025-11-11 15:59:13
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2024-43611 2025-11-11 15:22:42 2025-11-11 07:39:36
NVD nvd_CVE-2024-43611 2025-11-11 15:00:06 2025-11-11 07:47:32
CNNVD cnnvd_CNNVD-202410-737 2025-11-11 15:11:48 2025-11-11 07:59:13
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:59:13
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202410-737; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202410-737
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:47:32
affected_products_count: 15 → 23; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 15 -> 23
  • data_sources: ['cve'] -> ['cve', 'nvd']