Lucene search

K
vulnrichmentMicrosoftVULNRICHMENT:CVE-2024-30062
HistoryJun 11, 2024 - 4:59 p.m.

CVE-2024-30062 Windows Standards-Based Storage Management Service Remote Code Execution Vulnerability

2024-06-1116:59:49
CWE-416
microsoft
github.com
windows
storage management
remote code execution
vulnerability
cve-2024-30062

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

6.9 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.6%

CNA Affected

[
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.5936:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2019",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.17763.5936",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.5936:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2019 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.17763.5936",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.2527:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2022",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.20348.2527",
        "versionType": "custom"
      },
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.20348.2522",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7070:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2016",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.14393.7070",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.7070:*:*:*:*:*:*:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2016 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "10.0.0",
        "lessThan": "10.0.14393.7070",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22023:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2012 R2",
    "versions": [
      {
        "status": "affected",
        "version": "6.3.0",
        "lessThan": "6.3.9600.22023",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  },
  {
    "cpes": [
      "cpe:2.3:o:microsoft:windows_server_2012_R2:6.3.9600.22023:*:*:*:*:*:x64:*"
    ],
    "vendor": "Microsoft",
    "product": "Windows Server 2012 R2 (Server Core installation)",
    "versions": [
      {
        "status": "affected",
        "version": "6.3.0",
        "lessThan": "6.3.9600.22023",
        "versionType": "custom"
      }
    ],
    "platforms": [
      "x64-based Systems"
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C

6.9 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

21.6%