Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-38179 (GCVE-0-2024-38179)
Vulnerability from cvelistv5 – Published: 2024-10-08 17:35 – Updated: 2025-07-08 15:39- CWE-862 - Missing Authorization
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Microsoft | Azure Stack OS HCI |
Affected:
10.0.20349.0 , < 10.0.20349.2762
(custom)
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-38179",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-08T18:57:54.998412Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-08T18:58:10.324Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"platforms": [
"Unknown"
],
"product": "Azure Stack OS HCI",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.20349.2762",
"status": "affected",
"version": "10.0.20349.0",
"versionType": "custom"
}
]
},
{
"platforms": [
"Unknown"
],
"product": "Azure Stack HCI OS",
"vendor": "Microsoft",
"versions": [
{
"lessThan": "10.0.25398.1189",
"status": "affected",
"version": "10.0.25398.0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci_os_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20349.2762",
"versionStartIncluding": "10.0.20349.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci_os_23H2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1189",
"versionStartIncluding": "10.0.25398.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"datePublic": "2024-10-08T07:00:00.000Z",
"descriptions": [
{
"lang": "en-US",
"value": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en-US",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-862",
"description": "CWE-862: Missing Authorization",
"lang": "en-US",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-08T15:39:39.692Z",
"orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"shortName": "microsoft"
},
"references": [
{
"name": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability",
"tags": [
"vendor-advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179"
}
],
"title": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"assignerShortName": "microsoft",
"cveId": "CVE-2024-38179",
"datePublished": "2024-10-08T17:35:14.398Z",
"dateReserved": "2024-06-11T22:36:08.215Z",
"dateUpdated": "2025-07-08T15:39:39.692Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CF31A34-9492-498F-8A78-F233C0075CB2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad de elevaci\\u00f3n de privilegios en la infraestructura hiperconvergente (HCI) de Azure Stack\"}]",
"id": "CVE-2024-38179",
"lastModified": "2024-10-22T12:54:12.633",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"secure@microsoft.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 6.0}]}",
"published": "2024-10-08T18:15:07.717",
"references": "[{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179\", \"source\": \"secure@microsoft.com\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": "[{\"source\": \"secure@microsoft.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-862\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-38179\",\"sourceIdentifier\":\"secure@microsoft.com\",\"published\":\"2024-10-08T18:15:07.717\",\"lastModified\":\"2024-10-22T12:54:12.633\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de elevaci\u00f3n de privilegios en la infraestructura hiperconvergente (HCI) de Azure Stack\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"secure@microsoft.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-862\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF31A34-9492-498F-8A78-F233C0075CB2\"}]}]}],\"references\":[{\"url\":\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179\",\"source\":\"secure@microsoft.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-38179\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-08T18:57:54.998412Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-08T18:58:02.480Z\"}}], \"cna\": {\"title\": \"Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability\", \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C\"}, \"scenarios\": [{\"lang\": \"en-US\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Microsoft\", \"product\": \"Azure Stack OS HCI\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.20349.0\", \"lessThan\": \"10.0.20349.2762\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}, {\"vendor\": \"Microsoft\", \"product\": \"Azure Stack HCI OS\", \"versions\": [{\"status\": \"affected\", \"version\": \"10.0.25398.0\", \"lessThan\": \"10.0.25398.1189\", \"versionType\": \"custom\"}], \"platforms\": [\"Unknown\"]}], \"datePublic\": \"2024-10-08T07:00:00.000Z\", \"references\": [{\"url\": \"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179\", \"name\": \"Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability\", \"tags\": [\"vendor-advisory\"]}], \"descriptions\": [{\"lang\": \"en-US\", \"value\": \"Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en-US\", \"type\": \"CWE\", \"cweId\": \"CWE-862\", \"description\": \"CWE-862: Missing Authorization\"}]}], \"cpeApplicability\": [{\"nodes\": [{\"negate\": false, \"cpeMatch\": [{\"criteria\": \"cpe:2.3:a:microsoft:azure_stack_hci_os_22h2:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.20349.2762\", \"versionStartIncluding\": \"10.0.20349.0\"}, {\"criteria\": \"cpe:2.3:a:microsoft:azure_stack_hci_os_23H2:*:*:*:*:*:*:*:*\", \"vulnerable\": true, \"versionEndExcluding\": \"10.0.25398.1189\", \"versionStartIncluding\": \"10.0.25398.0\"}], \"operator\": \"OR\"}]}], \"providerMetadata\": {\"orgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"shortName\": \"microsoft\", \"dateUpdated\": \"2025-07-08T15:39:39.692Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-38179\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-08T15:39:39.692Z\", \"dateReserved\": \"2024-06-11T22:36:08.215Z\", \"assignerOrgId\": \"f38d906d-7342-40ea-92c1-6c4a2c6478c8\", \"datePublished\": \"2024-10-08T17:35:14.398Z\", \"assignerShortName\": \"microsoft\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-0856
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure Service Fabric 9.1 pour Linux versions antérieures à 9.1.2498.1 | ||
| Microsoft | Azure | Azure CLI versions antérieures à 2.65.0 | ||
| Microsoft | Azure | Azure Service Connector versions antérieures à 2.65.0 | ||
| Microsoft | Azure | Azure Service Fabric 10.1 pour Linux versions antérieures à 10.1.2308.1 | ||
| Microsoft | Azure | Azure Stack HCI 22H2 versions antérieures à 20349.2762 | ||
| Microsoft | Azure | Azure Service Fabric 10.0 pour Linux versions antérieures à 10.0.2345.1 | ||
| Microsoft | Azure | Azure Stack HCI 23H2 versions antérieures à 25398.1189 | ||
| Microsoft | Azure | Azure Monitor Agent versions antérieures à 1.30.0 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Service Fabric 9.1 pour Linux versions ant\u00e9rieures \u00e0 9.1.2498.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure CLI versions ant\u00e9rieures \u00e0 2.65.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Service Connector versions ant\u00e9rieures \u00e0 2.65.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Service Fabric 10.1 pour Linux versions ant\u00e9rieures \u00e0 10.1.2308.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack HCI 22H2 versions ant\u00e9rieures \u00e0 20349.2762",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Service Fabric 10.0 pour Linux versions ant\u00e9rieures \u00e0 10.0.2345.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack HCI 23H2 versions ant\u00e9rieures \u00e0 25398.1189",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Monitor Agent versions ant\u00e9rieures \u00e0 1.30.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-38179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38179"
},
{
"name": "CVE-2024-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43480"
},
{
"name": "CVE-2024-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38097"
},
{
"name": "CVE-2024-43591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43591"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0856",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2024-43480",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43480"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2024-38097",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38097"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2024-43591",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43591"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2024-38179",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179"
}
]
}
CERTFR-2024-AVI-0856
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Microsoft Azure. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et une élévation de privilèges.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Azure | Azure Service Fabric 9.1 pour Linux versions antérieures à 9.1.2498.1 | ||
| Microsoft | Azure | Azure CLI versions antérieures à 2.65.0 | ||
| Microsoft | Azure | Azure Service Connector versions antérieures à 2.65.0 | ||
| Microsoft | Azure | Azure Service Fabric 10.1 pour Linux versions antérieures à 10.1.2308.1 | ||
| Microsoft | Azure | Azure Stack HCI 22H2 versions antérieures à 20349.2762 | ||
| Microsoft | Azure | Azure Service Fabric 10.0 pour Linux versions antérieures à 10.0.2345.1 | ||
| Microsoft | Azure | Azure Stack HCI 23H2 versions antérieures à 25398.1189 | ||
| Microsoft | Azure | Azure Monitor Agent versions antérieures à 1.30.0 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Azure Service Fabric 9.1 pour Linux versions ant\u00e9rieures \u00e0 9.1.2498.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure CLI versions ant\u00e9rieures \u00e0 2.65.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Service Connector versions ant\u00e9rieures \u00e0 2.65.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Service Fabric 10.1 pour Linux versions ant\u00e9rieures \u00e0 10.1.2308.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack HCI 22H2 versions ant\u00e9rieures \u00e0 20349.2762",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Service Fabric 10.0 pour Linux versions ant\u00e9rieures \u00e0 10.0.2345.1",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Stack HCI 23H2 versions ant\u00e9rieures \u00e0 25398.1189",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Azure Monitor Agent versions ant\u00e9rieures \u00e0 1.30.0",
"product": {
"name": "Azure",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-38179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38179"
},
{
"name": "CVE-2024-43480",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43480"
},
{
"name": "CVE-2024-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38097"
},
{
"name": "CVE-2024-43591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43591"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0856",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-09T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Azure. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et une \u00e9l\u00e9vation de privil\u00e8ges.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Azure",
"vendor_advisories": [
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2024-43480",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43480"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2024-38097",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38097"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2024-43591",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43591"
},
{
"published_at": "2024-10-08",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Azure CVE-2024-38179",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179"
}
]
}
WID-SEC-W-2024-3125
Vulnerability from csaf_certbund - Published: 2024-10-08 22:00 - Updated: 2025-03-02 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Azure-Befehlszeilenschnittstelle (Command-Line Interface, CLI) setzt sich aus Befehlen zum Erstellen und Verwalten von Azure-Ressourcen zusammen. Die Azure CLI ist in allen Azure-Diensten verf\u00fcgbar. \r\nAzure ist eine Cloud Computing-Plattform von Microsoft.\r\nAzure Service Fabric ist eine Plattform f\u00fcr verteilte Systeme zur Paketierung, Bereitstellung und Verwaltung von Microservices und Containern. \r\nAzure Stack ist ein Microsoft-Produkt aus der Azure-Familie. Mit Azure Stack k\u00f6nnen die Public-Cloud-Services von Microsoft auch im eigenen Rechenzentrum betrieben werden.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Microsoft Azure CLI, Microsoft Azure, Microsoft Azure Service Fabric und Microsoft Azure Stack ausnutzen, um seine Privilegien zu erh\u00f6hen und beliebigen Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3125 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3125.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3125 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3125"
},
{
"category": "external",
"summary": "Microsoft Leitfaden f\u00fcr Sicherheitsupdates",
"url": "https://msrc.microsoft.com/update-guide/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0751-1 vom 2025-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HOVLXCBIPWYWM5QCYR5UCDWAMQBNVBE4/"
}
],
"source_lang": "en-US",
"title": "Microsoft Azure CLI: Mehrere Schwachstellen erm\u00f6glichen Privilegieneskalation und Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2025-03-02T23:00:00.000+00:00",
"generator": {
"date": "2025-03-03T11:44:55.078+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2024-3125",
"initial_release_date": "2024-10-08T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-10-08T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "2",
"summary": "Produktversion angepasst"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Service Connector",
"product": {
"name": "Microsoft Azure Service Connector",
"product_id": "T038091",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:service_connector"
}
}
},
{
"category": "product_version",
"name": "Monitor Agent",
"product": {
"name": "Microsoft Azure Monitor Agent",
"product_id": "T038092",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure:monitor_agent"
}
}
}
],
"category": "product_name",
"name": "Azure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.65.0",
"product": {
"name": "Microsoft Azure CLI \u003c2.65.0",
"product_id": "T038352"
}
},
{
"category": "product_version",
"name": "2.65.0",
"product": {
"name": "Microsoft Azure CLI 2.65.0",
"product_id": "T038352-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_cli:2.65.0"
}
}
}
],
"category": "product_name",
"name": "Azure CLI"
},
{
"branches": [
{
"category": "product_version",
"name": "10.1 for Linux",
"product": {
"name": "Microsoft Azure Service Fabric 10.1 for Linux",
"product_id": "T038093",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_service_fabric:10.1_for_linux"
}
}
},
{
"category": "product_version",
"name": "10.0 for Linux",
"product": {
"name": "Microsoft Azure Service Fabric 10.0 for Linux",
"product_id": "T038094",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_service_fabric:10.0_for_linux"
}
}
},
{
"category": "product_version",
"name": "9.1 for Linux",
"product": {
"name": "Microsoft Azure Service Fabric 9.1 for Linux",
"product_id": "T038095",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_service_fabric:9.1_for_linux"
}
}
}
],
"category": "product_name",
"name": "Azure Service Fabric"
},
{
"branches": [
{
"category": "product_version",
"name": "HCI 22H2",
"product": {
"name": "Microsoft Azure Stack HCI 22H2",
"product_id": "T038096",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hci_22h2"
}
}
},
{
"category": "product_version",
"name": "HCI 23H2",
"product": {
"name": "Microsoft Azure Stack HCI 23H2",
"product_id": "T038097",
"product_identification_helper": {
"cpe": "cpe:/a:microsoft:azure_stack:hci_23h2"
}
}
}
],
"category": "product_name",
"name": "Azure Stack"
}
],
"category": "vendor",
"name": "Microsoft"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38097",
"product_status": {
"known_affected": [
"T038096",
"T038097",
"T038352",
"T002207",
"T038092",
"T038093",
"T038094",
"T038095",
"T038091"
]
},
"release_date": "2024-10-08T22:00:00.000+00:00",
"title": "CVE-2024-38097"
},
{
"cve": "CVE-2024-38179",
"product_status": {
"known_affected": [
"T038096",
"T038097",
"T038352",
"T002207",
"T038092",
"T038093",
"T038094",
"T038095",
"T038091"
]
},
"release_date": "2024-10-08T22:00:00.000+00:00",
"title": "CVE-2024-38179"
},
{
"cve": "CVE-2024-43480",
"product_status": {
"known_affected": [
"T038096",
"T038097",
"T038352",
"T002207",
"T038092",
"T038093",
"T038094",
"T038095",
"T038091"
]
},
"release_date": "2024-10-08T22:00:00.000+00:00",
"title": "CVE-2024-43480"
},
{
"cve": "CVE-2024-43591",
"product_status": {
"known_affected": [
"T038096",
"T038097",
"T038352",
"T002207",
"T038092",
"T038093",
"T038094",
"T038095",
"T038091"
]
},
"release_date": "2024-10-08T22:00:00.000+00:00",
"title": "CVE-2024-43591"
}
]
}
FKIE_CVE-2024-38179
Vulnerability from fkie_nvd - Published: 2024-10-08 18:15 - Updated: 2024-10-22 12:54| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179 | Patch, Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | azure_stack_hci | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_stack_hci:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CF31A34-9492-498F-8A78-F233C0075CB2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability"
},
{
"lang": "es",
"value": "Vulnerabilidad de elevaci\u00f3n de privilegios en la infraestructura hiperconvergente (HCI) de Azure Stack"
}
],
"id": "CVE-2024-38179",
"lastModified": "2024-10-22T12:54:12.633",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2024-10-08T18:15:07.717",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-24PG-VQRW-X656
Vulnerability from github – Published: 2024-10-08 18:33 – Updated: 2024-10-08 18:33Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability
{
"affected": [],
"aliases": [
"CVE-2024-38179"
],
"database_specific": {
"cwe_ids": [
"CWE-862"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2024-10-08T18:15:07Z",
"severity": "HIGH"
},
"details": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability",
"id": "GHSA-24pg-vqrw-x656",
"modified": "2024-10-08T18:33:14Z",
"published": "2024-10-08T18:33:14Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-38179"
},
{
"type": "WEB",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
NCSC-2024-0393
Vulnerability from csaf_ncscnl - Published: 2024-10-08 19:57 - Updated: 2024-10-08 19:57Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in diverse Azure componenten.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om zich verhoogde rechten toe te kennen of code uit te voeren met rechten van een administrator.\n\n```\nAzure Monitor: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38097 | 7.10 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure CLI: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43591 | 8.70 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38179 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nService Fabric: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43480 | 6.60 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Azure componenten",
"tracking": {
"current_release_date": "2024-10-08T19:57:08.426643Z",
"id": "NCSC-2024-0393",
"initial_release_date": "2024-10-08T19:57:08.426643Z",
"revision_history": [
{
"date": "2024-10-08T19:57:08.426643Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "azure_cli",
"product": {
"name": "azure_cli",
"product_id": "CSAFPID-772071",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_cli:2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "azure_monitor",
"product": {
"name": "azure_monitor",
"product_id": "CSAFPID-1454052",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_monitor:1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "azure_service_connector",
"product": {
"name": "azure_service_connector",
"product_id": "CSAFPID-1455939",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_service_connector:0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "azure_service_fabric_for_linux",
"product": {
"name": "azure_service_fabric_for_linux",
"product_id": "CSAFPID-1667136",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_service_fabric_for_linux:10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "azure_service_fabric_for_linux",
"product": {
"name": "azure_service_fabric_for_linux",
"product_id": "CSAFPID-1667137",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_service_fabric_for_linux:10.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "azure_service_fabric_for_linux",
"product": {
"name": "azure_service_fabric_for_linux",
"product_id": "CSAFPID-1667135",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_service_fabric_for_linux:9.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "azure_stack_hci",
"product": {
"name": "azure_stack_hci",
"product_id": "CSAFPID-1667133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hci:10.2408.1.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "azure_stack_hci",
"product": {
"name": "azure_stack_hci",
"product_id": "CSAFPID-1667132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hci:20349.2700:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38097",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1454052"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38097",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38097.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1454052"
]
}
],
"title": "CVE-2024-38097"
},
{
"cve": "CVE-2024-38179",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1667132",
"CSAFPID-1667133"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38179",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38179.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1667132",
"CSAFPID-1667133"
]
}
],
"title": "CVE-2024-38179"
},
{
"cve": "CVE-2024-43480",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1667135",
"CSAFPID-1667136",
"CSAFPID-1667137"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43480",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43480.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1667135",
"CSAFPID-1667136",
"CSAFPID-1667137"
]
}
],
"title": "CVE-2024-43480"
},
{
"cve": "CVE-2024-43591",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
}
],
"product_status": {
"known_affected": [
"CSAFPID-772071",
"CSAFPID-1455939"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43591",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43591.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-772071",
"CSAFPID-1455939"
]
}
],
"title": "CVE-2024-43591"
}
]
}
NCSC-2024-0392
Vulnerability from csaf_ncscnl - Published: 2024-10-08 19:55 - Updated: 2024-10-08 19:55Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Microsoft heeft kwetsbaarheden verholpen in Windows.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot onderstaande categorie\u00c3\u00abn schade.\n\nDe ernstigste kwetsbaarheid heeft kenmerk CVE-2024-38124 toegewezen gekregen en bevindt zich in de NETLOGON functionaliteit. Succesvol misbruik is echter niet eenvoudig en vereist voorafgaande kennis van de infrastructuur en precieze timing, waarbij een randvoorwaarde van succes is dat er een nieuwe Domain Controller wordt ingericht.\n\n```\nMicrosoft Simple Certificate Enrollment Protocol: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43541 | 7.50 | Denial-of-Service | \n| CVE-2024-43544 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows cURL Implementation: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-6197 | 8.80 | Uitvoeren van willekeurige code, | \n|----------------|------|-------------------------------------|\n\nWindows Secure Channel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43550 | 7.40 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43582 | 8.10 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nMicrosoft ActiveX: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43517 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Telephony Server: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43518 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43456 | 4.80 | Manipuleren van gegevens | \n|----------------|------|-------------------------------------|\n\nWindows MSHTML Platform: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43573 | 6.50 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Mobile Broadband: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43525 | 6.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43526 | 6.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43537 | 6.50 | Denial-of-Service | \n| CVE-2024-43538 | 6.50 | Denial-of-Service | \n| CVE-2024-43540 | 6.50 | Denial-of-Service | \n| CVE-2024-43542 | 6.50 | Denial-of-Service | \n| CVE-2024-43543 | 6.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43523 | 6.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43524 | 6.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43536 | 6.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43555 | 6.50 | Denial-of-Service | \n| CVE-2024-43557 | 6.50 | Denial-of-Service | \n| CVE-2024-43558 | 6.50 | Denial-of-Service | \n| CVE-2024-43559 | 6.50 | Denial-of-Service | \n| CVE-2024-43561 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Standards-Based Storage Management Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43512 | 6.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nMicrosoft WDAC OLE DB provider for SQL: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43519 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nRemote Desktop Client: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43533 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43599 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Kernel-Mode Drivers: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43535 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2024-43554 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nCode Integrity Guard: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43585 | 5.50 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Print Spooler Components: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43529 | 7.30 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Resilient File System (ReFS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43500 | 5.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nMicrosoft Management Console: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43572 | 7.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nRPC Endpoint Mapper Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43532 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Graphics Component: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43508 | 5.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-43534 | 6.50 | Toegang tot gevoelige gegevens | \n| CVE-2024-43509 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-43556 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Local Security Authority (LSA): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43522 | 7.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nSudo for Windows: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43571 | 5.60 | Voordoen als andere gebruiker | \n|----------------|------|-------------------------------------|\n\nWindows Scripting: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43584 | 7.70 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWinlogon: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43583 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Kerberos: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38129 | 7.50 | Verkrijgen van verhoogde rechten | \n| CVE-2024-43547 | 6.50 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Cryptographic Services: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43546 | 5.60 | Toegang tot gevoelige gegevens | \n|----------------|------|-------------------------------------|\n\nWindows Routing and Remote Access Service (RRAS): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38261 | 7.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43608 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43607 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38265 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43453 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-38212 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43549 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43564 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43589 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43592 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43593 | 8.80 | Uitvoeren van willekeurige code | \n| CVE-2024-43611 | 8.80 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows EFI Partition: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-37976 | 6.70 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37982 | 6.70 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-37983 | 6.70 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nRole: Windows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-20659 | 7.10 | Omzeilen van beveiligingsmaatregel | \n| CVE-2024-43521 | 7.50 | Denial-of-Service | \n| CVE-2024-43567 | 7.50 | Denial-of-Service | \n| CVE-2024-43575 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Hyper-V: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-30092 | 8.00 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows NT OS Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43553 | 7.40 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Network Address Translation (NAT): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43562 | 7.50 | Denial-of-Service | \n| CVE-2024-43565 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Remote Desktop Licensing Service: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38262 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nOpenSSH for Windows: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43581 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-43615 | 7.10 | Uitvoeren van willekeurige code | \n| CVE-2024-38029 | 7.50 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows NTFS: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43514 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Netlogon: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38124 | 9.00 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Storage Port Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43560 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Common Log File System Driver: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43501 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Secure Kernel Mode: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43516 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-43528 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nMicrosoft Windows Speech: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43574 | 8.30 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nWindows Ancillary Function Driver for WinSock: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43563 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows BitLocker: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43513 | 6.40 | Omzeilen van beveiligingsmaatregel | \n|----------------|------|-------------------------------------|\n\nWindows Online Certificate Status Protocol (OCSP): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43545 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nInternet Small Computer Systems Interface (iSCSI): \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43515 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n\nWindows Kernel: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43502 | 7.10 | Verkrijgen van verhoogde rechten | \n| CVE-2024-43527 | 7.80 | Verkrijgen van verhoogde rechten | \n| CVE-2024-37979 | 6.70 | Verkrijgen van verhoogde rechten | \n| CVE-2024-43511 | 7.00 | Verkrijgen van verhoogde rechten | \n| CVE-2024-43520 | 5.00 | Denial-of-Service | \n| CVE-2024-43570 | 6.40 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nAzure Stack: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-38179 | 8.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Storage: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43551 | 7.80 | Verkrijgen van verhoogde rechten | \n|----------------|------|-------------------------------------|\n\nWindows Shell: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43552 | 7.30 | Uitvoeren van willekeurige code | \n|----------------|------|-------------------------------------|\n\nBranchCache: \n|----------------|------|-------------------------------------|\n| CVE-ID | CVSS | Impact |\n|----------------|------|-------------------------------------|\n| CVE-2024-43506 | 7.50 | Denial-of-Service | \n| CVE-2024-38149 | 7.50 | Denial-of-Service | \n|----------------|------|-------------------------------------|\n```",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Microsoft heeft updates beschikbaar gesteld waarmee de beschreven kwetsbaarheden worden verholpen. We raden u aan om deze updates te installeren. Meer informatie over de kwetsbaarheden, de installatie van de updates en eventuele work-arounds vindt u op:\n\nhttps://portal.msrc.microsoft.com/en-us/security-guidance",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Incorrect Access of Indexable Resource (\u0027Range Error\u0027)",
"title": "CWE-118"
},
{
"category": "general",
"text": "Not Failing Securely (\u0027Failing Open\u0027)",
"title": "CWE-636"
},
{
"category": "general",
"text": "Free of Memory not on the Heap",
"title": "CWE-590"
},
{
"category": "general",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "general",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
},
{
"category": "general",
"text": "Improper Removal of Sensitive Information Before Storage or Transfer",
"title": "CWE-212"
},
{
"category": "general",
"text": "Improper Restriction of Communication Channel to Intended Endpoints",
"title": "CWE-923"
},
{
"category": "general",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
},
{
"category": "general",
"text": "Buffer Over-read",
"title": "CWE-126"
},
{
"category": "general",
"text": "Improper Neutralization",
"title": "CWE-707"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
},
{
"category": "general",
"text": "Execution with Unnecessary Privileges",
"title": "CWE-250"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Improper Certificate Validation",
"title": "CWE-295"
},
{
"category": "general",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "External Control of File Name or Path",
"title": "CWE-73"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"title": "Kwetsbaarheden verholpen in Microsoft Windows",
"tracking": {
"current_release_date": "2024-10-08T19:55:28.028805Z",
"id": "NCSC-2024-0392",
"initial_release_date": "2024-10-08T19:55:28.028805Z",
"revision_history": [
{
"date": "2024-10-08T19:55:28.028805Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "azure_stack_hci",
"product": {
"name": "azure_stack_hci",
"product_id": "CSAFPID-1667133",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hci:10.2408.1.9:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "azure_stack_hci",
"product": {
"name": "azure_stack_hci",
"product_id": "CSAFPID-1667132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:azure_stack_hci:20349.2700:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "remote_desktop_client_for_windows_desktop",
"product": {
"name": "remote_desktop_client_for_windows_desktop",
"product_id": "CSAFPID-1455711",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:remote_desktop_client_for_windows_desktop:1.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows",
"product": {
"name": "windows",
"product_id": "CSAFPID-549001",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_1507",
"product": {
"name": "windows_10_version_1507",
"product_id": "CSAFPID-1453769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1507:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_1607",
"product": {
"name": "windows_10_version_1607",
"product_id": "CSAFPID-1453770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1607:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_1809",
"product": {
"name": "windows_10_version_1809",
"product_id": "CSAFPID-1453758",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_1809:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_21h2",
"product": {
"name": "windows_10_version_21h2",
"product_id": "CSAFPID-1453800",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_21h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10_version_22h2",
"product": {
"name": "windows_10_version_22h2",
"product_id": "CSAFPID-1453802",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_10_version_22h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_21h2",
"product": {
"name": "windows_11_version_21h2",
"product_id": "CSAFPID-1453799",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_21h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_22h2",
"product": {
"name": "windows_11_version_22h2",
"product_id": "CSAFPID-1453801",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_22h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_22h3",
"product": {
"name": "windows_11_version_22h3",
"product_id": "CSAFPID-1453803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_22h3:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_23h2",
"product": {
"name": "windows_11_version_23h2",
"product_id": "CSAFPID-1453804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_23h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11_version_24h2",
"product": {
"name": "windows_11_version_24h2",
"product_id": "CSAFPID-1615902",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_11_version_24h2:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008__service_pack_2",
"product": {
"name": "windows_server_2008__service_pack_2",
"product_id": "CSAFPID-1453778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008__service_pack_2:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_r2_service_pack_1",
"product": {
"name": "windows_server_2008_r2_service_pack_1",
"product_id": "CSAFPID-1453779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1:6.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_r2_service_pack_1__server_core_installation_",
"product": {
"name": "windows_server_2008_r2_service_pack_1__server_core_installation_",
"product_id": "CSAFPID-1453780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_r2_service_pack_1__server_core_installation_:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_service_pack_2",
"product": {
"name": "windows_server_2008_service_pack_2",
"product_id": "CSAFPID-1453776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008_service_pack_2__server_core_installation_",
"product": {
"name": "windows_server_2008_service_pack_2__server_core_installation_",
"product_id": "CSAFPID-1453777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2008_service_pack_2__server_core_installation_:6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012",
"product": {
"name": "windows_server_2012",
"product_id": "CSAFPID-1453781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012__server_core_installation_",
"product": {
"name": "windows_server_2012__server_core_installation_",
"product_id": "CSAFPID-1453782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012__server_core_installation_:6.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012_r2",
"product": {
"name": "windows_server_2012_r2",
"product_id": "CSAFPID-1453783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012_r2:6.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012_r2__server_core_installation_",
"product": {
"name": "windows_server_2012_r2__server_core_installation_",
"product_id": "CSAFPID-1453784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2012_r2__server_core_installation_:6.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2016",
"product": {
"name": "windows_server_2016",
"product_id": "CSAFPID-1453771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2016:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2016__server_core_installation_",
"product": {
"name": "windows_server_2016__server_core_installation_",
"product_id": "CSAFPID-1453772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2016__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2019",
"product": {
"name": "windows_server_2019",
"product_id": "CSAFPID-1453759",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2019:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2019__server_core_installation_",
"product": {
"name": "windows_server_2019__server_core_installation_",
"product_id": "CSAFPID-1453760",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2019__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2022",
"product": {
"name": "windows_server_2022",
"product_id": "CSAFPID-1453798",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2022:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2022__23h2_edition__server_core_installation_",
"product": {
"name": "windows_server_2022__23h2_edition__server_core_installation_",
"product_id": "CSAFPID-1453805",
"product_identification_helper": {
"cpe": "cpe:2.3:a:microsoft:windows_server_2022__23h2_edition__server_core_installation_:10.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows",
"product": {
"name": "windows",
"product_id": "CSAFPID-1622087",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows:remote_desktop_client:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10",
"product": {
"name": "windows_10",
"product_id": "CSAFPID-2507",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10",
"product": {
"name": "windows_10",
"product_id": "CSAFPID-2482",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10",
"product": {
"name": "windows_10",
"product_id": "CSAFPID-2483",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10",
"product": {
"name": "windows_10",
"product_id": "CSAFPID-2481",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_10",
"product": {
"name": "windows_10",
"product_id": "CSAFPID-3823",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11",
"product": {
"name": "windows_11",
"product_id": "CSAFPID-168717",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11:21h2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11",
"product": {
"name": "windows_11",
"product_id": "CSAFPID-168718",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11",
"product": {
"name": "windows_11",
"product_id": "CSAFPID-804567",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11:23h2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_11",
"product": {
"name": "windows_11",
"product_id": "CSAFPID-1610036",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_11:24h2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008",
"product": {
"name": "windows_server_2008",
"product_id": "CSAFPID-2489",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2008",
"product": {
"name": "windows_server_2008",
"product_id": "CSAFPID-2490",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2012",
"product": {
"name": "windows_server_2012",
"product_id": "CSAFPID-2429",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2016",
"product": {
"name": "windows_server_2016",
"product_id": "CSAFPID-2417",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2019",
"product": {
"name": "windows_server_2019",
"product_id": "CSAFPID-2414",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2022",
"product": {
"name": "windows_server_2022",
"product_id": "CSAFPID-75345",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "windows_server_2022_23h2",
"product": {
"name": "windows_server_2022_23h2",
"product_id": "CSAFPID-747000",
"product_identification_helper": {
"cpe": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "microsoft"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-43516",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43516",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43516.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-43516"
},
{
"cve": "CVE-2024-43502",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43502",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43502.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453800",
"CSAFPID-1453802"
]
}
],
"title": "CVE-2024-43502"
},
{
"cve": "CVE-2024-43506",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784",
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2490",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43506",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43506.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784",
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2490",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482"
]
}
],
"title": "CVE-2024-43506"
},
{
"cve": "CVE-2024-43513",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43513",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43513.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43513"
},
{
"cve": "CVE-2024-43515",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43515",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43515.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43515"
},
{
"cve": "CVE-2024-43518",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43518",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43518.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43518"
},
{
"cve": "CVE-2024-43519",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2489",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2490",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43519",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43519.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2489",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2490",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43519"
},
{
"cve": "CVE-2024-43525",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43525",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43525.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43525"
},
{
"cve": "CVE-2024-43526",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43526",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43526.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483"
]
}
],
"title": "CVE-2024-43526"
},
{
"cve": "CVE-2024-43532",
"cwe": {
"id": "CWE-636",
"name": "Not Failing Securely (\u0027Failing Open\u0027)"
},
"notes": [
{
"category": "other",
"text": "Not Failing Securely (\u0027Failing Open\u0027)",
"title": "CWE-636"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43532",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43532.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43532"
},
{
"cve": "CVE-2024-43534",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43534",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43534.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43534"
},
{
"cve": "CVE-2024-43535",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43535"
},
{
"cve": "CVE-2024-43537",
"cwe": {
"id": "CWE-908",
"name": "Use of Uninitialized Resource"
},
"notes": [
{
"category": "other",
"text": "Use of Uninitialized Resource",
"title": "CWE-908"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43537",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43537.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43537"
},
{
"cve": "CVE-2024-43538",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43538",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43538.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43538"
},
{
"cve": "CVE-2024-43540",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43540",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43540.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43540"
},
{
"cve": "CVE-2024-43542",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43542",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43542.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43542"
},
{
"cve": "CVE-2024-43543",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-2483"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43543",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43543.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-2483"
]
}
],
"title": "CVE-2024-43543"
},
{
"cve": "CVE-2024-43554",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"notes": [
{
"category": "other",
"text": "Improper Removal of Sensitive Information Before Storage or Transfer",
"title": "CWE-212"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-43554"
},
{
"cve": "CVE-2024-43573",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-549001",
"CSAFPID-1453802",
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453800",
"CSAFPID-1453804",
"CSAFPID-1453759",
"CSAFPID-1453758",
"CSAFPID-1453760",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453771",
"CSAFPID-1453770",
"CSAFPID-1453784",
"CSAFPID-1453772",
"CSAFPID-1453783"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43573",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43573.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-549001",
"CSAFPID-1453802",
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453800",
"CSAFPID-1453804",
"CSAFPID-1453759",
"CSAFPID-1453758",
"CSAFPID-1453760",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453771",
"CSAFPID-1453770",
"CSAFPID-1453784",
"CSAFPID-1453772",
"CSAFPID-1453783"
]
}
],
"title": "CVE-2024-43573"
},
{
"cve": "CVE-2024-43581",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "other",
"text": "External Control of File Name or Path",
"title": "CWE-73"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43581",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43581.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43581"
},
{
"cve": "CVE-2024-6197",
"cwe": {
"id": "CWE-590",
"name": "Free of Memory not on the Heap"
},
"notes": [
{
"category": "other",
"text": "Free of Memory not on the Heap",
"title": "CWE-590"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-6197",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6197.json"
}
],
"title": "CVE-2024-6197"
},
{
"cve": "CVE-2024-43615",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "other",
"text": "External Control of File Name or Path",
"title": "CWE-73"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43615",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43615.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43615"
},
{
"cve": "CVE-2024-37976",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-37976"
},
{
"cve": "CVE-2024-37982",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37982",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37982.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-37982"
},
{
"cve": "CVE-2024-37983",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37983",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37983.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-37983"
},
{
"cve": "CVE-2024-38149",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38149",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38149.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-38149"
},
{
"cve": "CVE-2024-43501",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43501",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43501.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43501"
},
{
"cve": "CVE-2024-43509",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2489",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2490",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43509",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43509.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2489",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2490",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43509"
},
{
"cve": "CVE-2024-43511",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43511",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43511.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-43511"
},
{
"cve": "CVE-2024-43514",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43514",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43514.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43514"
},
{
"cve": "CVE-2024-43517",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2489",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2490",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43517",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43517.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2489",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2490",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43517"
},
{
"cve": "CVE-2024-43520",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43520",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43520.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43520"
},
{
"cve": "CVE-2024-43523",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43523",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43523.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43523"
},
{
"cve": "CVE-2024-43524",
"cwe": {
"id": "CWE-118",
"name": "Incorrect Access of Indexable Resource (\u0027Range Error\u0027)"
},
"notes": [
{
"category": "other",
"text": "Incorrect Access of Indexable Resource (\u0027Range Error\u0027)",
"title": "CWE-118"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43524",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43524.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43524"
},
{
"cve": "CVE-2024-43528",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43528",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43528.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43528"
},
{
"cve": "CVE-2024-43536",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43536",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43536.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483"
]
}
],
"title": "CVE-2024-43536"
},
{
"cve": "CVE-2024-43547",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"notes": [
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43547",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43547.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43547"
},
{
"cve": "CVE-2024-43550",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Certificate Validation",
"title": "CWE-295"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43550",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43550.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43550"
},
{
"cve": "CVE-2024-43551",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"title": "CWE-59"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43551",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43551.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482"
]
}
],
"title": "CVE-2024-43551"
},
{
"cve": "CVE-2024-43553",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43553",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43553"
},
{
"cve": "CVE-2024-43555",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43555",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43555"
},
{
"cve": "CVE-2024-43556",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43556",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43556.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43556"
},
{
"cve": "CVE-2024-43557",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43557",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43557.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43557"
},
{
"cve": "CVE-2024-43558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43558",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43558.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43558"
},
{
"cve": "CVE-2024-43559",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43559",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43559.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483"
]
}
],
"title": "CVE-2024-43559"
},
{
"cve": "CVE-2024-43560",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43560",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43560.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43560"
},
{
"cve": "CVE-2024-43561",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-2414",
"CSAFPID-2481",
"CSAFPID-2483"
]
}
],
"title": "CVE-2024-43561"
},
{
"cve": "CVE-2024-43562",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43562",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43562.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-43562"
},
{
"cve": "CVE-2024-43563",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43563",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43563.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43563"
},
{
"cve": "CVE-2024-43565",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43565",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43565.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482"
]
}
],
"title": "CVE-2024-43565"
},
{
"cve": "CVE-2024-43570",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43570",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43570.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615902",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43570"
},
{
"cve": "CVE-2024-43572",
"cwe": {
"id": "CWE-707",
"name": "Improper Neutralization"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization",
"title": "CWE-707"
}
],
"product_status": {
"known_affected": [
"CSAFPID-549001",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43572",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43572.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-549001",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43572"
},
{
"cve": "CVE-2024-43582",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43582",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43582.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43582"
},
{
"cve": "CVE-2024-43585",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43585",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43585.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43585"
},
{
"cve": "CVE-2024-43599",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43599.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43599"
},
{
"cve": "CVE-2024-43583",
"cwe": {
"id": "CWE-250",
"name": "Execution with Unnecessary Privileges"
},
"notes": [
{
"category": "other",
"text": "Execution with Unnecessary Privileges",
"title": "CWE-250"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43583",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43583.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43583"
},
{
"cve": "CVE-2024-20659",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-20659",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-20659.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-20659"
},
{
"cve": "CVE-2024-30092",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Inclusion of Functionality from Untrusted Control Sphere",
"title": "CWE-829"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-30092",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30092.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-2483",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-2482",
"CSAFPID-1453758",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1453769",
"CSAFPID-1453770",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-30092"
},
{
"cve": "CVE-2024-38261",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38261",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38261.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38261"
},
{
"cve": "CVE-2024-43541",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43541",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43541.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43541"
},
{
"cve": "CVE-2024-43608",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43608",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43608.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43608"
},
{
"cve": "CVE-2024-43607",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43607",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43607.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43607"
},
{
"cve": "CVE-2024-37979",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37979",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37979.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-37979"
},
{
"cve": "CVE-2024-38124",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "other",
"text": "Improper Authentication",
"title": "CWE-287"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38124",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38124.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38124"
},
{
"cve": "CVE-2024-38265",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-747000",
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2489",
"CSAFPID-2490",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-75345",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38265",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38265.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-747000",
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2489",
"CSAFPID-2490",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-75345",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38265"
},
{
"cve": "CVE-2024-38262",
"cwe": {
"id": "CWE-591",
"name": "Sensitive Data Storage in Improperly Locked Memory"
},
"notes": [
{
"category": "other",
"text": "Sensitive Data Storage in Improperly Locked Memory",
"title": "CWE-591"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38262",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38262.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38262"
},
{
"cve": "CVE-2024-43453",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43453",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43453.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43453"
},
{
"cve": "CVE-2024-38212",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38212",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38212.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-38212"
},
{
"cve": "CVE-2024-43456",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43456",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43456.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43456"
},
{
"cve": "CVE-2024-43512",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43512",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43512.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43512"
},
{
"cve": "CVE-2024-43521",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"notes": [
{
"category": "other",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43521",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43521.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43521"
},
{
"cve": "CVE-2024-43544",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43544",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43544.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43544"
},
{
"cve": "CVE-2024-43545",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43545",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43545.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43545"
},
{
"cve": "CVE-2024-43549",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43549",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43549.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43549"
},
{
"cve": "CVE-2024-43564",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43564",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43564.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43564"
},
{
"cve": "CVE-2024-43567",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-747000",
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-75345",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43567",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43567.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-747000",
"CSAFPID-2429",
"CSAFPID-2507",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-75345",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43567"
},
{
"cve": "CVE-2024-43575",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-747000",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-75345",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43575",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43575.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-747000",
"CSAFPID-2414",
"CSAFPID-2417",
"CSAFPID-75345",
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772"
]
}
],
"title": "CVE-2024-43575"
},
{
"cve": "CVE-2024-43589",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43589",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43589.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43589"
},
{
"cve": "CVE-2024-43592",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43592"
},
{
"cve": "CVE-2024-43593",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43593",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43593.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43593"
},
{
"cve": "CVE-2024-43611",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43611",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43611.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453759",
"CSAFPID-1453760",
"CSAFPID-1453798",
"CSAFPID-1453805",
"CSAFPID-1453771",
"CSAFPID-1453772",
"CSAFPID-1453776",
"CSAFPID-1453777",
"CSAFPID-1453778",
"CSAFPID-1453779",
"CSAFPID-1453780",
"CSAFPID-1453781",
"CSAFPID-1453782",
"CSAFPID-1453783",
"CSAFPID-1453784"
]
}
],
"title": "CVE-2024-43611"
},
{
"cve": "CVE-2024-43529",
"cwe": {
"id": "CWE-822",
"name": "Untrusted Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "Untrusted Pointer Dereference",
"title": "CWE-822"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43529",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43529.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43529"
},
{
"cve": "CVE-2024-43533",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1455711",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-75345"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43533",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1455711",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-75345"
]
}
],
"title": "CVE-2024-43533"
},
{
"cve": "CVE-2024-43546",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43546",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43546.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481",
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43546"
},
{
"cve": "CVE-2024-43574",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43574",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43574.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453800",
"CSAFPID-1453801",
"CSAFPID-1453802",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718",
"CSAFPID-3823",
"CSAFPID-75345",
"CSAFPID-2481"
]
}
],
"title": "CVE-2024-43574"
},
{
"cve": "CVE-2024-43584",
"cwe": {
"id": "CWE-693",
"name": "Protection Mechanism Failure"
},
"notes": [
{
"category": "other",
"text": "Protection Mechanism Failure",
"title": "CWE-693"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43584",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43584.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453798",
"CSAFPID-1453799",
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43584"
},
{
"cve": "CVE-2024-38179",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1667132",
"CSAFPID-1667133"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38179",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38179.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1667132",
"CSAFPID-1667133"
]
}
],
"title": "CVE-2024-38179"
},
{
"cve": "CVE-2024-43508",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43508",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43508.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902",
"CSAFPID-747000",
"CSAFPID-168718"
]
}
],
"title": "CVE-2024-43508"
},
{
"cve": "CVE-2024-43500",
"cwe": {
"id": "CWE-126",
"name": "Buffer Over-read"
},
"notes": [
{
"category": "other",
"text": "Buffer Over-read",
"title": "CWE-126"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43500",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43500.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43500"
},
{
"cve": "CVE-2024-43522",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43522",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43522.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804"
]
}
],
"title": "CVE-2024-43522"
},
{
"cve": "CVE-2024-43552",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43552",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43552.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453801",
"CSAFPID-1453803",
"CSAFPID-1453804",
"CSAFPID-1453805",
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43552"
},
{
"cve": "CVE-2024-38029",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"category": "other",
"text": "External Control of File Name or Path",
"title": "CWE-73"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453805"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38029",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38029.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453805"
]
}
],
"title": "CVE-2024-38029"
},
{
"cve": "CVE-2024-38129",
"cwe": {
"id": "CWE-285",
"name": "Improper Authorization"
},
"notes": [
{
"category": "other",
"text": "Improper Authorization",
"title": "CWE-285"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1453805"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38129",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38129.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1453805"
]
}
],
"title": "CVE-2024-38129"
},
{
"cve": "CVE-2024-43527",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43527",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43527.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43527"
},
{
"cve": "CVE-2024-43571",
"cwe": {
"id": "CWE-923",
"name": "Improper Restriction of Communication Channel to Intended Endpoints"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Communication Channel to Intended Endpoints",
"title": "CWE-923"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1615902"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43571",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43571.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1615902"
]
}
],
"title": "CVE-2024-43571"
}
]
}
MSRC_CVE-2024-38179
Vulnerability from csaf_microsoft - Published: 2024-10-08 07:00 - Updated: 2025-06-15 07:00Notes
{
"document": {
"acknowledgments": [
{
"names": [
"Barry Markey with Microsoft"
]
}
],
"aggregate_severity": {
"namespace": "https://www.microsoft.com/en-us/msrc/security-update-severity-rating-system",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
},
{
"category": "general",
"text": "Required. The vulnerability documented by this CVE requires customer action to resolve.",
"title": "Customer Action"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38179 Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179"
},
{
"category": "self",
"summary": "CVE-2024-38179 Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2024/msrc_cve-2024-38179.json"
},
{
"category": "external",
"summary": "Microsoft Exploitability Index",
"url": "https://www.microsoft.com/en-us/msrc/exploitability-index?rtc=1"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability",
"tracking": {
"current_release_date": "2025-06-15T07:00:00.000Z",
"generator": {
"date": "2025-07-08T15:38:22.394Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2024-38179",
"initial_release_date": "2024-10-08T07:00:00.000Z",
"revision_history": [
{
"date": "2024-10-08T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-06-15T07:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Updated the build numbers. This is an informational update only."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.20349.2762",
"product": {
"name": "Azure Stack HCI OS 22H2 \u003c10.0.20349.2762",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "10.0.20349.2762",
"product": {
"name": "Azure Stack HCI OS 22H2 10.0.20349.2762",
"product_id": "12426"
}
}
],
"category": "product_name",
"name": "Azure Stack HCI OS 22H2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.0.25398.1189",
"product": {
"name": "Azure Stack HCI OS 23H2 \u003c10.0.25398.1189",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "10.0.25398.1189",
"product": {
"name": "Azure Stack HCI OS 23H2 10.0.25398.1189",
"product_id": "12427"
}
}
],
"category": "product_name",
"name": "Azure Stack HCI OS 23H2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-38179",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "general",
"text": "Microsoft",
"title": "Assigning CNA"
},
{
"category": "faq",
"text": "Successful exploitation of this vulnerability could allow an attacker to perform operations in the victim\u0027s hybrid cloud environment with the same privileges as the compromised managed identity.",
"title": "According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?"
},
{
"category": "faq",
"text": "An attacker who successfully exploited this vulnerability could gain the privileges of the compromised managed identity.",
"title": "What privileges could be gained by an attacker who successfully exploited the vulnerability?"
},
{
"category": "faq",
"text": "An attacker with basic user privileges could compromise an unencrypted service principal for a managed identity and perform service management operations on other resources in the hybrid environment the managed identity is permitted to manage.",
"title": "How could an attacker exploit this vulnerability?"
}
],
"product_status": {
"fixed": [
"12426",
"12427"
],
"known_affected": [
"1",
"2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38179 Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability - HTML",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38179"
},
{
"category": "self",
"summary": "CVE-2024-38179 Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability - CSAF",
"url": "https://msrc.microsoft.com/csaf/advisories/2024/msrc_cve-2024-38179.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2024-10-08T07:00:00.000Z",
"details": "10.0.20349.2762:Security Update:https://support.microsoft.com/help/5046012",
"product_ids": [
"2"
],
"url": "https://support.microsoft.com/help/5046012"
},
{
"category": "vendor_fix",
"date": "2024-10-08T07:00:00.000Z",
"details": "10.0.25398.1189:Security Update:https://support.microsoft.com/help/5049058",
"product_ids": [
"1"
],
"url": "https://support.microsoft.com/help/5049058"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"exploitCodeMaturity": "UNPROVEN",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"remediationLevel": "OFFICIAL_FIX",
"reportConfidence": "CONFIRMED",
"scope": "CHANGED",
"temporalScore": 7.7,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Elevation of Privilege"
},
{
"category": "exploit_status",
"details": "Publicly Disclosed:No;Exploited:No;Latest Software Release:Exploitation Less Likely"
}
],
"title": "Azure Stack Hyperconverged Infrastructure (HCI) Elevation of Privilege Vulnerability"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.