Lucene search

K
kasperskyKaspersky LabKLA67449
HistoryMay 14, 2024 - 12:00 a.m.

KLA67449 Multiple vulnerabilities in Git for Windows

2024-05-1400:00:00
Kaspersky Lab
threats.kaspersky.com
6
git for windows
malicious users
privilege escalation
arbitrary code execution
bypass security restrictions
vulnerabilities
public exploits
cve-2024-32002
cve-2024-32004
cve-2024-32465
cve-2024-32020
cve-2024-32021
update
security restrictions

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

8.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

40.2%

Multiple vulnerabilities were found in Git for Windows. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. An elevation of privilege vulnerability can be exploited remotely to gain privileges.
  2. An arbitrary code execution can be exploited remotely to execute arbitrary code.
  3. A security vulnerability can be exploited to bypass security restrictions.

Original advisories

Securing Git: Addressing 5 new vulnerabilities

Exploitation

Public exploits exist for this vulnerability.

Related products

Git-for-Windows

CVE list

CVE-2024-32002 critical

CVE-2024-32004 critical

CVE-2024-32465 high

CVE-2024-32020 warning

CVE-2024-32021 warning

Solution

Update to the latest version

Download Git for Windows

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • OSI

Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Git for Windows 2.45.x earlier than 2.45.1Git for Windows 2.44.x earlier than 2.44.1Git for Windows 2.43.x earlier than 2.43.4Git for Windows 2.42.x earlier than 2.42.2Git for Windows 2.41.x earlier than 2.41.1Git for Windows 2.40.x earlier than 2.40.2Git for Windows 2.39.x earlier than 2.39.4

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

8.3 High

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

40.2%