CVE-2024-20681Use After Free in Microsoft Windows 10 Version 21h2

CWE-416Use After Free9 documents6 sources
Severity
7.8HIGHNVD
EPSS
0.3%
top 51.24%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 9

Description

Windows Subsystem for Linux Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages12 packages

NVDmicrosoft/windows_10_21h2< 10.0.19044.3930
NVDmicrosoft/windows_10_22h2< 10.0.19045.3930
NVDmicrosoft/windows_11_21h2< 10.0.22000.2713
NVDmicrosoft/windows_11_22h2< 10.0.22621.3007
NVDmicrosoft/windows_11_23h2< 10.0.22631.3007

Patches

🔴Vulnerability Details

2
GHSA
GHSA-3p2x-fgmw-32pv: Windows Subsystem for Linux Elevation of Privilege Vulnerability2024-01-09
CVEList
Windows Subsystem for Linux Elevation of Privilege Vulnerability2024-01-09

📋Vendor Advisories

1
Microsoft
Windows Subsystem for Linux Elevation of Privilege Vulnerability2024-01-09

🕵️Threat Intelligence

5
Trendmicro
The January 2024 Security Update Review2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
Bleepingcomputer
Microsoft January 2024 Patch Tuesday fixes 49 flaws, 12 RCE bugs2024-01-09
Trendmicro
The January 2024 Security Update Review2024-01-09
CVE-2024-20681 — Use After Free in Microsoft | cvebase