This host is missing an important security update for Microsoft Windows 11 version 21H2 (KB5030217). It is affected by multiple vulnerabilities which can allow attackers to elevate privileges, execute arbitrary commands, bypass security features, disclose information, and conduct DoS attacks
Reporter | Title | Published | Views | Family All 187 |
---|---|---|---|---|
![]() | Microsoft Windows Multiple Vulnerabilities (KB5030219) | 13 Sep 202300:00 | – | openvas |
![]() | Microsoft Windows Multiple Vulnerabilities (KB5030211) | 13 Sep 202300:00 | – | openvas |
![]() | Microsoft Windows Multiple Vulnerabilities (KB5030220) | 13 Sep 202300:00 | – | openvas |
![]() | Microsoft Windows Multiple Vulnerabilities (KB5030214) | 13 Sep 202300:00 | – | openvas |
![]() | Microsoft Windows Multiple Vulnerabilities (KB5030213) | 13 Sep 202300:00 | – | openvas |
![]() | September 12, 2023—KB5030219 (OS Build 22621.2283) | 12 Sep 202307:00 | – | mskb |
![]() | September 12, 2023—KB5030217 (OS Build 22000.2416) | 12 Sep 202307:00 | – | mskb |
![]() | September 12, 2023—KB5030211 (OS Builds 19044.3448 and 19045.3448) | 12 Sep 202307:00 | – | mskb |
![]() | September 12, 2023—KB5030216 (OS Build 20348.1970) | 12 Sep 202307:00 | – | mskb |
![]() | September 12, 2023—Hotpatch KB5030325 (OS Build 20348.1964) | 12 Sep 202307:00 | – | mskb |
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.832174");
script_version("2023-10-13T05:06:10+0000");
script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
script_cve_id("CVE-2023-35355", "CVE-2023-36802", "CVE-2023-36803", "CVE-2023-36804",
"CVE-2023-36805", "CVE-2023-38139", "CVE-2023-38140", "CVE-2023-38141",
"CVE-2023-38142", "CVE-2023-38143", "CVE-2023-38144", "CVE-2023-38146",
"CVE-2023-38147", "CVE-2023-38148", "CVE-2023-38149", "CVE-2023-38150",
"CVE-2023-38160", "CVE-2023-38161");
script_tag(name:"cvss_base", value:"8.3");
script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:N/C:C/I:C/A:C");
script_tag(name:"last_modification", value:"2023-10-13 05:06:10 +0000 (Fri, 13 Oct 2023)");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2023-09-12 19:38:00 +0000 (Tue, 12 Sep 2023)");
script_tag(name:"creation_date", value:"2023-09-13 11:24:42 +0530 (Wed, 13 Sep 2023)");
script_name("Microsoft Windows Multiple Vulnerabilities (KB5030217)");
script_tag(name:"summary", value:"This host is missing an important security
update according to Microsoft KB5030217");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present
on the target host.");
script_tag(name:"insight", value:"Multiple flaws exist due to:
- Issues in the authentication. Using a smart card to join or rejoin
a computer to an Active Directory domain might fail.
For more information about the vulnerabilities refer to Reference links.");
script_tag(name:"impact", value:"Successful exploitation would allow an
attacker to elevate privileges, execute arbitrary commands, bypass security
feature, disclose information and conduct DoS attacks.");
script_tag(name:"affected", value:"Microsoft Windows 11 version 21H2 for x64-based Systems.");
script_tag(name:"solution", value:"The vendor has released updates. Please see
the references for more information.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"executable_version");
script_xref(name:"URL", value:"https://support.microsoft.com/en-us/help/5030217");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2023 Greenbone AG");
script_family("Windows : Microsoft Bulletins");
script_dependencies("smb_reg_service_pack.nasl");
script_require_ports(139, 445);
script_mandatory_keys("SMB/WindowsVersion");
exit(0);
}
include("smb_nt.inc");
include("secpod_reg.inc");
include("version_func.inc");
include("secpod_smb_func.inc");
if(hotfix_check_sp(win11:1) <= 0) {
exit(0);
}
key = "SOFTWARE\Microsoft\Windows NT\CurrentVersion";
if(!registry_key_exists(key:key)) {
exit(0);
}
build = registry_get_sz(key:key, item:"CurrentBuild");
if(!build) {
exit(0);
}
dllPath = smb_get_systemroot();
if(!dllPath ) {
exit(0);
}
fileVer = fetch_file_version(sysPath:dllPath, file_name:"\system32\user32.dll");
if(!fileVer) {
exit(0);
}
if(version_is_less(version:fileVer, test_version:"10.0.22000.2360")) {
report = report_fixed_ver(file_checked:dllPath + "\system32\user32.dll", file_version:fileVer, vulnerable_range:"Less than 10.0.22000.2360");
security_message(port:0, data:report);
exit(0);
}
exit(99);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo