VID |
26892 |
Severity |
40 |
Port |
139.445 |
Protocol |
TCP |
Class |
SMB |
Detailed Description |
Microsoft Security Update for July 2024 is not installed. The remote Windows host is missing a security update. It is, therefore, affected by multiple vulnerabilities
- RADIUS Protocol under RFC 2865 is susceptible to forgery attacks by a local attacker who can modify any valid Response (Access-Accept, Access-Reject, or Access-Challenge) to any other response using a chosen- prefix collision attack against MD5 Response Authenticator signature. (CVE-2024-3596) - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2024-30013, CVE-2024-38104)
* References: https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825
* Platforms Affected: Windows Server 2008 R2 SP1 Windows Server 2008 R2 x64 SP1 Windows 8.1 Windows Server 2012 Windows Server 2012 R2 Windows 10 Windows 11 Windows Server 2016 Windows Server 2019 |
Recommendation |
Apply the appropriate patch for your system, as listed in Microsoft Security Bulletin July 2024 Microsoft security update at
https://support.microsoft.com/en-us/help/4009469 https://support.microsoft.com/en-us/help/4009470 https://support.microsoft.com/en-us/help/4009471 https://support.microsoft.com/en-us/help/4000825 -- OR -- Patches for Windows platforms are also available from the Microsoft Windows Update Web site, http://windowsupdate.microsoft.com. Windows Update detects what version of Windows you are running and offers the appropriate patch. |
Related URL |
CVE-2024-30013,CVE-2024-3596,CVE-2024-38091,CVE-2024-38099,CVE-2024-38100,CVE-2024-38101,CVE-2024-38102,CVE-2024-38104,CVE-2024-38105 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|