Vulnerabilites related to microsoft - defender_for_endpoint
cve-2022-23278
Vulnerability from cvelistv5
Published
2022-03-09 17:06
Modified
2025-01-02 18:35
Severity ?
EPSS score ?
Summary
Microsoft Defender for Endpoint Spoofing Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278 | vendor-advisory |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Microsoft Defender for Endpoint for Linux |
Version: 101.0.0 < 101.60.93 |
||||||||||||||||||||||||||
|
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T03:36:20.346Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "Microsoft Defender for Endpoint Spoofing Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for Linux", vendor: "Microsoft", versions: [ { lessThan: "101.60.93", status: "affected", version: "101.0.0", versionType: "custom", }, ], }, { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for Mac", vendor: "Microsoft", versions: [ { lessThan: "101.60.91", status: "affected", version: "101.0.0", versionType: "custom", }, ], }, { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for Android", vendor: "Microsoft", versions: [ { lessThan: "1.0.3011.0302", status: "affected", version: "1.0.0.0", versionType: "custom", }, ], }, { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for iOS", vendor: "Microsoft", versions: [ { lessThan: "1.1.18090109", status: "affected", version: "1.0.0.0", versionType: "custom", }, ], }, { platforms: [ "Windows 10 Version 20H2 for 32-bit Systems", "Windows 10 Version 1909 for ARM64-based Systems", "Windows Server, version 20H2 (Server Core Installation)", "Windows 11 version 21H2 for x64-based Systems", "Windows 10 Version 21H2 for 32-bit Systems", "Windows 11 version 21H2 for ARM64-based Systems", "Windows 10 Version 1909 for x64-based Systems", "Windows Server 2022", "Windows Server 2022 Datacenter: Azure Edition", "Windows 10 Version 1909 for 32-bit Systems", "Windows 10 Version 21H1 for ARM64-based Systems", "Windows 10 Version 20H2 for ARM64-based Systems", "Windows Server 2019 (Server Core installation)", "Windows 10 Version 21H1 for 32-bit Systems", "Windows 10 Version 21H2 for x64-based Systems", "Windows 10 Version 21H2 for ARM64-based Systems", "Windows Server 2022 (Server Core installation)", "Windows 10 Version 21H1 for x64-based Systems", "Windows Server 2019", "Windows 10 Version 1809 for x64-based Systems", "Windows 10 Version 1809 for ARM64-based Systems", "Windows 10 Version 1809 for 32-bit Systems", ], product: "Microsoft Defender for Endpoint for Windows", vendor: "Microsoft", versions: [ { lessThan: "10.0.19042.1586", status: "affected", version: "1.0.0.0", versionType: "custom", }, ], }, { platforms: [ "Windows Server 2016", "Windows Server 2016 (Server Core installation)", "Windows Server 2012 R2", "Windows Server 2012 R2 (Server Core installation)", ], product: "Microsoft Defender for Endpoint EDR sensor", vendor: "Microsoft", versions: [ { lessThan: "10.8047.22439", status: "affected", version: "1.0.0.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionEndExcluding: "101.60.93", versionStartIncluding: "101.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:macos:*:*", versionEndExcluding: "101.60.91", versionStartIncluding: "101.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionEndExcluding: "1.0.3011.0302", versionStartIncluding: "1.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionEndExcluding: "1.1.18090109", versionStartIncluding: "1.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.19042.1586", versionStartIncluding: "1.0.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint_edr_sensor:*:*:*:*:*:*:*:*", versionEndExcluding: "10.8047.22439", versionStartIncluding: "1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2022-03-08T08:00:00+00:00", descriptions: [ { lang: "en-US", value: "Microsoft Defender for Endpoint Spoofing Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 5.9, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "Spoofing", lang: "en-US", type: "Impact", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-02T18:35:25.563Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Defender for Endpoint Spoofing Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278", }, ], title: "Microsoft Defender for Endpoint Spoofing Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2022-23278", datePublished: "2022-03-09T17:06:57", dateReserved: "2022-01-15T00:00:00", dateUpdated: "2025-01-02T18:35:25.563Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49071
Vulnerability from cvelistv5
Published
2024-12-12 19:07
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49071 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft | Microsoft Defender for Endpoint for Windows |
Version: N/A |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49071", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-12-12T21:11:18.320547Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-12T21:11:39.964Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for Windows", vendor: "Microsoft", versions: [ { status: "affected", version: "N/A", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionStartIncluding: "N/A", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-12T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.", }, ], metrics: [ { cvssV3_1: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-612", description: "CWE-612: Improper Authorization of Index Containing Sensitive Information", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:43.319Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Windows Defender Information Disclosure Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49071", }, ], tags: [ "exclusively-hosted-service", ], title: "Windows Defender Information Disclosure Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49071", datePublished: "2024-12-12T19:07:50.753Z", dateReserved: "2024-10-11T20:57:49.195Z", dateUpdated: "2025-03-11T16:44:43.319Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-49057
Vulnerability from cvelistv5
Published
2024-12-10 17:49
Modified
2025-03-11 16:44
Severity ?
EPSS score ?
Summary
Microsoft Defender for Endpoint on Android Spoofing Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49057 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft | Microsoft Defender for Endpoint for Android |
Version: 1.0.0.0 < 1.0.7128.0101 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-49057", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-01-07T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-01-08T04:56:02.707Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for Android", vendor: "Microsoft", versions: [ { lessThan: "1.0.7128.0101", status: "affected", version: "1.0.0.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionEndExcluding: "1.0.7128.0101", versionStartIncluding: "1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-12-10T08:00:00.000Z", descriptions: [ { lang: "en-US", value: "Microsoft Defender for Endpoint on Android Spoofing Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20: Improper Input Validation", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:44:02.115Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Defender for Endpoint on Android Spoofing Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49057", }, ], title: "Microsoft Defender for Endpoint on Android Spoofing Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-49057", datePublished: "2024-12-10T17:49:04.575Z", dateReserved: "2024-10-11T20:57:49.188Z", dateUpdated: "2025-03-11T16:44:02.115Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-35828
Vulnerability from cvelistv5
Published
2022-09-13 18:41
Modified
2025-03-11 16:10
Severity ?
EPSS score ?
Summary
Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35828 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft | Microsoft Defender for Endpoint for Mac |
Version: 101.0.0 < 101.78.13 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T09:44:22.170Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35828", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for Mac", vendor: "Microsoft", versions: [ { lessThan: "101.78.13", status: "affected", version: "101.0.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:macos:*:*", versionEndExcluding: "101.78.13", versionStartIncluding: "101.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2022-09-13T07:00:00.000Z", descriptions: [ { lang: "en-US", value: "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "Elevation of Privilege", lang: "en-US", type: "Impact", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-11T16:10:21.448Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35828", }, ], title: "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2022-35828", datePublished: "2022-09-13T18:41:52", dateReserved: "2022-07-13T00:00:00", dateUpdated: "2025-03-11T16:10:21.448Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-43614
Vulnerability from cvelistv5
Published
2024-10-08 17:36
Modified
2025-01-29 23:51
Severity ?
EPSS score ?
Summary
Microsoft Defender for Endpoint for Linux Spoofing Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43614 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft | Microsoft Defender for Endpoint for Linux |
Version: 101.0.0 < 101.24052.0002 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-43614", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-10-08T18:34:19.602647Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-10-08T19:23:32.600Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for Linux", vendor: "Microsoft", versions: [ { lessThan: "101.24052.0002", status: "affected", version: "101.0.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionEndExcluding: "101.24052.0002", versionStartIncluding: "101.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-10-08T07:00:00.000Z", descriptions: [ { lang: "en-US", value: "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 5.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-23", description: "CWE-23: Relative Path Traversal", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-29T23:51:03.191Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43614", }, ], title: "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-43614", datePublished: "2024-10-08T17:36:18.291Z", dateReserved: "2024-08-14T01:08:33.553Z", dateUpdated: "2025-01-29T23:51:03.191Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2024-21315
Vulnerability from cvelistv5
Published
2024-02-13 18:02
Modified
2024-12-31 18:51
Severity ?
EPSS score ?
Summary
Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft | Microsoft Defender for Endpoint for Windows |
Version: 1.0.0.0 < 10.0.17763.5122 |
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2024-21315", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-02-14T15:35:25.681720Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-06-12T19:09:24.865Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, { providerMetadata: { dateUpdated: "2024-08-01T22:20:40.204Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "Windows 10 Version 1809 for 32-bit Systems", "Windows 10 Version 1809 for x64-based Systems", "Windows 10 Version 1809 for ARM64-based Systems", "Windows Server 2019", "Windows Server 2019 (Server Core installation)", "Windows Server 2022", "Windows Server 2022 (Server Core installation)", "Windows 11 version 21H2 for x64-based Systems", "Windows 11 version 21H2 for ARM64-based Systems", "Windows 10 Version 21H2 for 32-bit Systems", "Windows 10 Version 21H2 for ARM64-based Systems", "Windows 10 Version 21H2 for x64-based Systems", "Windows 10 for 32-bit Systems", "Windows 10 for x64-based Systems", "Windows 10 Version 1607 for 32-bit Systems", "Windows 10 Version 1607 for x64-based Systems", "Windows Server 2016", "Windows Server 2016 (Server Core installation)", "Windows Server 2012 R2", "Windows Server 2012 R2 (Server Core installation)", "Windows 11 Version 23H2 for ARM64-based Systems", "Windows 11 Version 22H2 for ARM64-based Systems", "Windows 10 Version 22H2 for x64-based Systems", "Windows 10 Version 22H2 for ARM64-based Systems", "Windows Server 2022, 23H2 Edition (Server Core installation)", "Windows 11 Version 23H2 for x64-based Systems", "Windows 11 Version 22H2 for x64-based Systems", "Windows 10 Version 22H2 for 32-bit Systems", "Windows Server 2012", "Windows Server 2012 (Server Core installation)", ], product: "Microsoft Defender for Endpoint for Windows", vendor: "Microsoft", versions: [ { lessThan: "10.0.17763.5122", status: "affected", version: "1.0.0.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionEndExcluding: "10.0.17763.5122", versionStartIncluding: "1.0.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2024-02-20T08:00:00+00:00", descriptions: [ { lang: "en-US", value: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-20", description: "CWE-20: Improper Input Validation", lang: "en-US", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-12-31T18:51:53.902Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315", }, ], title: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2024-21315", datePublished: "2024-02-13T18:02:27.519Z", dateReserved: "2023-12-08T22:45:19.366Z", dateUpdated: "2024-12-31T18:51:53.902Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2022-33637
Vulnerability from cvelistv5
Published
2022-07-12 22:37
Modified
2025-01-02 19:24
Severity ?
EPSS score ?
Summary
Microsoft Defender for Endpoint Tampering Vulnerability
References
▼ | URL | Tags |
---|---|---|
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Microsoft | Microsoft Defender for Endpoint for Linux |
Version: 101.0.0 < 101.68.80 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-03T08:09:22.319Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "Microsoft Defender for Endpoint Tampering Vulnerability", tags: [ "vendor-advisory", "x_transferred", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { platforms: [ "Unknown", ], product: "Microsoft Defender for Endpoint for Linux", vendor: "Microsoft", versions: [ { lessThan: "101.68.80", status: "affected", version: "101.0.0", versionType: "custom", }, ], }, ], cpeApplicability: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:*:*:*", versionEndExcluding: "101.68.80", versionStartIncluding: "101.0.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], datePublic: "2022-07-12T07:00:00+00:00", descriptions: [ { lang: "en-US", value: "Microsoft Defender for Endpoint Tampering Vulnerability", }, ], metrics: [ { cvssV3_1: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en-US", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "Tampering", lang: "en-US", type: "Impact", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-02T19:24:38.250Z", orgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", shortName: "microsoft", }, references: [ { name: "Microsoft Defender for Endpoint Tampering Vulnerability", tags: [ "vendor-advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637", }, ], title: "Microsoft Defender for Endpoint Tampering Vulnerability", }, }, cveMetadata: { assignerOrgId: "f38d906d-7342-40ea-92c1-6c4a2c6478c8", assignerShortName: "microsoft", cveId: "CVE-2022-33637", datePublished: "2022-07-12T22:37:58", dateReserved: "2022-06-14T00:00:00", dateUpdated: "2025-01-02T19:24:38.250Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2022-07-12 23:15
Modified
2024-11-21 07:08
Severity ?
Summary
Microsoft Defender for Endpoint Tampering Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | defender_for_endpoint | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:linux:*:*", matchCriteriaId: "1EFDA019-FE81-4CBC-8B31-E8F9C42272A4", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Microsoft Defender for Endpoint Tampering Vulnerability", }, { lang: "es", value: "Una Vulnerabilidad de manipulación de Microsoft Defender for Endpoint", }, ], id: "CVE-2022-33637", lastModified: "2024-11-21T07:08:13.563", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "NONE", baseScore: 4, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:S/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "secure@microsoft.com", type: "Secondary", }, ], }, published: "2022-07-12T23:15:12.277", references: [ { source: "secure@microsoft.com", url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33637", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-03-09 17:15
Modified
2024-11-21 06:48
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
Microsoft Defender for Endpoint Spoofing Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | defender_for_endpoint_edr_sensor | * | |
microsoft | windows_server_2012 | r2 | |
microsoft | windows_server_2016 | - | |
microsoft | defender_for_endpoint | - | |
microsoft | windows_10 | 20h2 | |
microsoft | windows_10 | 21h1 | |
microsoft | windows_10 | 21h2 | |
microsoft | windows_10 | 1809 | |
microsoft | windows_10 | 1909 | |
microsoft | windows_11 | - | |
microsoft | windows_11 | - | |
microsoft | windows_server | 20h2 | |
microsoft | windows_server | 2022 | |
microsoft | windows_server_2019 | - | |
microsoft | defender_for_endpoint | - | |
linux | linux_kernel | - | |
apple | macos | - | |
android | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint_edr_sensor:*:*:*:*:*:*:*:*", matchCriteriaId: "94C76B85-1113-4CBE-B112-471E98E007B3", versionEndExcluding: "10.8047.22439.1056", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:*:*:*", matchCriteriaId: "1C9118F2-2432-43F6-A08B-90A568D12777", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*", matchCriteriaId: "9E2C378B-1507-4C81-82F6-9F599616845A", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*", matchCriteriaId: "FAE4278F-71A7-43E9-8F79-1CBFAE71D730", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*", matchCriteriaId: "71E65CB9-6DC2-4A90-8C6A-103BEDC99823", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", matchCriteriaId: "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", matchCriteriaId: "E9273B95-20ED-4547-B0A8-95AD15B30372", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*", matchCriteriaId: "B9F64296-66BF-4F1D-A11C-0C44C347E2AC", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*", matchCriteriaId: "5D7F7DDB-440E-42CD-82F4-B2C13F3CC462", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*", matchCriteriaId: "1EAF6DBA-6E3A-4854-BFBF-B5DC36CE5929", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*", matchCriteriaId: "BE257836-4F4D-4352-8293-B9CAD34F8794", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:*:*:*", matchCriteriaId: "1C9118F2-2432-43F6-A08B-90A568D12777", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:a:linux:linux_kernel:-:*:*:*:*:*:*:*", matchCriteriaId: "8BA79AC0-A0CC-4EE6-AEF5-9B8C8EA2C9F1", vulnerable: false, }, { criteria: "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", matchCriteriaId: "387021A0-AF36-463C-A605-32EA7DAC172E", vulnerable: false, }, { criteria: "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", matchCriteriaId: "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Microsoft Defender for Endpoint Spoofing Vulnerability", }, { lang: "es", value: "Una vulnerabilidad de Suplantación de Identidad de Microsoft Defender for Endpoint", }, ], id: "CVE-2022-23278", lastModified: "2024-11-21T06:48:18.743", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "secure@microsoft.com", type: "Secondary", }, { cvssData: { attackComplexity: "HIGH", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.9, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.2, impactScore: 3.6, source: "nvd@nist.gov", type: "Secondary", }, ], }, published: "2022-03-09T17:15:11.210", references: [ { source: "secure@microsoft.com", url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-10-08 18:15
Modified
2024-10-21 20:50
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Microsoft Defender for Endpoint for Linux Spoofing Vulnerability
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43614 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | defender_for_endpoint | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:linux:*:*", matchCriteriaId: "B1C19969-2E8D-4FDB-8345-61E3128B7819", versionEndExcluding: "101.24052.0002", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Microsoft Defender for Endpoint for Linux Spoofing Vulnerability", }, { lang: "es", value: "Vulnerabilidad de suplantación de Microsoft Defender for Endpoint for Linux", }, ], id: "CVE-2024-43614", lastModified: "2024-10-21T20:50:38.370", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "secure@microsoft.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 5.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-10-08T18:15:29.623", references: [ { source: "secure@microsoft.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43614", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-23", }, ], source: "secure@microsoft.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-09-13 19:15
Modified
2025-01-02 20:15
Severity ?
Summary
Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | defender_for_endpoint | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:macos:*:*", matchCriteriaId: "E913B5DC-7E6F-47FD-9979-C5AE396EDEF2", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability", }, { lang: "es", value: "Una vulnerabilidad de Elevación de Privilegios de Microsoft Defender for Endpoint for Mac", }, ], id: "CVE-2022-35828", lastModified: "2025-01-02T20:15:49.700", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "secure@microsoft.com", type: "Primary", }, ], }, published: "2022-09-13T19:15:11.137", references: [ { source: "secure@microsoft.com", url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35828", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35828", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-12-12 19:15
Modified
2025-01-10 18:24
Severity ?
Summary
Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49071 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | defender_for_endpoint | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:-:*:*:*:*:windows:*:*", matchCriteriaId: "B601F85E-E9AA-47B5-A2D7-AD6DC8C04C0D", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [ { sourceIdentifier: "secure@microsoft.com", tags: [ "exclusively-hosted-service", ], }, ], descriptions: [ { lang: "en", value: "Improper authorization of an index that contains sensitive information from a Global Files search in Windows Defender allows an authorized attacker to disclose information over a network.", }, { lang: "es", value: "La autorización incorrecta de un índice que contiene información confidencial de una búsqueda de archivos globales en Windows Defender permite a un atacante autorizado divulgar información a través de una red.", }, ], id: "CVE-2024-49071", lastModified: "2025-01-10T18:24:41.833", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "secure@microsoft.com", type: "Primary", }, ], }, published: "2024-12-12T19:15:09.387", references: [ { source: "secure@microsoft.com", tags: [ "Vendor Advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49071", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-612", }, ], source: "secure@microsoft.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-Other", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-02-13 18:15
Modified
2024-11-21 08:54
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315 | Patch, Vendor Advisory |
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "6110E9B7-9AF4-4BB8-8E38-F2419A1E0B12", versionEndExcluding: "10.0.25398.531", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*", matchCriteriaId: "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "34FE251F-9F96-4C7A-9AE1-8040A2A98B42", versionEndExcluding: "10.0.19045.3693", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:arm64:*", matchCriteriaId: "A9D54EE6-30AF-411C-A285-A4DCB6C6EC06", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", matchCriteriaId: "C230D3BF-7FCE-405C-B62E-B9190C995C3C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "C43F35FF-BCFC-434A-A6D4-6EDEEEC91E94", versionEndExcluding: "10.0.22621.2715", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:arm64:*", matchCriteriaId: "B2D24C54-F04F-4717-B614-FE67B3ED9DC0", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:arm64:*", matchCriteriaId: "B0301BA0-81DB-4FC1-9BC3-EB48A56BC608", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "89BDD39C-EED5-418E-8734-23FD425F43E4", versionEndExcluding: "6.3.9600.21813", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", matchCriteriaId: "DB18C4CE-5917-401E-ACF7-2747084FD36E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "31793C00-933B-4CBB-9EAF-27AFF4C82CBE", versionEndExcluding: "10.0.14393.6452", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", matchCriteriaId: "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", matchCriteriaId: "0A1BC97A-263E-4291-8AEF-02EE4E6031E9", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", matchCriteriaId: "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "51D2081C-CA6C-4F6F-8D29-FCCD64FAB4FC", versionEndExcluding: "6.2.9200.24710", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "34FE251F-9F96-4C7A-9AE1-8040A2A98B42", versionEndExcluding: "10.0.19045.3693", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x86:*", matchCriteriaId: "1FD62DCB-66D1-4CEA-828E-0BD302AC63CA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "C43F35FF-BCFC-434A-A6D4-6EDEEEC91E94", versionEndExcluding: "10.0.22621.2715", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", matchCriteriaId: "D5EC3F68-8F41-4F6B-B2E5-920322A4A321", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", matchCriteriaId: "8E3C1327-F331-4448-A253-00EAC7428317", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "60637E9C-A03E-4E64-B559-D817CF8AA82C", versionEndExcluding: "10.0.10240.20308", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", matchCriteriaId: "A045AC0A-471E-444C-B3B0-4CABC23E8CFB", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:*", matchCriteriaId: "28A7FEE9-B473-48A0-B0ED-A5CC1E44194C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "8D2F0987-1200-46E8-B224-CD9E0AE33BD1", versionEndExcluding: "10.0.19043.3693", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:arm64:*", matchCriteriaId: "8FC46499-DB6E-48BF-9334-85EE27AFE7AF", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", matchCriteriaId: "83A79DD6-E74E-419F-93F1-323B68502633", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x86:*", matchCriteriaId: "61959ACC-B608-4556-92AF-4D94B338907A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "D4ADA63C-F2DA-4770-9D22-6E0A5521A4CC", versionEndExcluding: "10.0.22000.2600", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:arm64:*", matchCriteriaId: "F2D718BD-C4B7-48DB-BE78-B9CA22F27DD0", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", matchCriteriaId: "0C3552E0-F793-4CDD-965D-457495475805", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "C9D85511-1F11-4992-A183-0B6C78D5F8C2", versionEndExcluding: "6.2.9200.24569", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "51D16F16-CDCD-48EE-B0A7-02DC0F2317E8", versionEndExcluding: "10.0.20348.2113", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", matchCriteriaId: "821614DD-37DD-44E2-A8A4-FE8D23A33C3C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:windows:*:*", matchCriteriaId: "53FF14C4-9735-4A8B-8DDE-D1F852346200", versionEndExcluding: "10.0.17763.5122", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:*", matchCriteriaId: "73D24713-D897-408D-893B-77A61982597D", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", matchCriteriaId: "306B7CE6-8239-4AED-9ED4-4C9F5B349F58", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", matchCriteriaId: "345FCD64-D37B-425B-B64C-8B1640B7E850", vulnerable: false, }, { criteria: "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", matchCriteriaId: "DB79EE26-FC32-417D-A49C-A1A63165A968", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability", }, { lang: "es", value: "Vulnerabilidad de elevación de privilegios de Microsoft Defender para Endpoint Protection", }, ], id: "CVE-2024-21315", lastModified: "2024-11-21T08:54:05.510", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "secure@microsoft.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 7.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-02-13T18:15:48.403", references: [ { source: "secure@microsoft.com", tags: [ "Patch", "Vendor Advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Patch", "Vendor Advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21315", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "secure@microsoft.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2024-12-12 02:04
Modified
2025-01-08 12:39
Severity ?
Summary
Microsoft Defender for Endpoint on Android Spoofing Vulnerability
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49057 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | defender_for_endpoint | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:microsoft:defender_for_endpoint:*:*:*:*:*:android:*:*", matchCriteriaId: "9E3DD335-D880-4268-B8F4-3C3FE43A2374", versionEndExcluding: "1.0.7128.0101", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "Microsoft Defender for Endpoint on Android Spoofing Vulnerability", }, { lang: "es", value: "Vulnerabilidad de suplantación de Microsoft Defender for Endpoint en Android", }, ], id: "CVE-2024-49057", lastModified: "2025-01-08T12:39:35.633", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "secure@microsoft.com", type: "Primary", }, ], }, published: "2024-12-12T02:04:29.907", references: [ { source: "secure@microsoft.com", tags: [ "Vendor Advisory", ], url: "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49057", }, ], sourceIdentifier: "secure@microsoft.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "secure@microsoft.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }