- Description
- Windows libarchive Remote Code Execution Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Modified
CVSS 3.1
- Type
- Secondary
- Base score
- 7.3
- Impact score
- 5.9
- Exploitability score
- 1.3
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-122
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
libarchive-harness-win - CVE-2024-20696 Windows libarchive Remote Code Execution Vulnerability https://t.co/uIn0b5kdkh
@turne85540
1 Dec 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Patch Tuesday Diffing: CVE-2024-20696 - Windows Libarchive RCE https://t.co/UECZFSUpED #Pentesting #Windows #CyberSecurity #Infosec https://t.co/RSFtzgr8o7
@ptracesecurity
29 Nov 2024
1157 Impressions
5 Retweets
14 Likes
7 Bookmarks
0 Replies
0 Quotes
Patch diffing CVE-2024-20696: Windows Libarchive RCE https://t.co/dextETvFy5 Credits @clearbluejar #windows #cybersecurity https://t.co/e9XiYzfnFP
@0xor0ne
28 Nov 2024
6386 Impressions
24 Retweets
109 Likes
31 Bookmarks
0 Replies
0 Quotes
Patch Tuesday Diffing: CVE-2024-20696 - Windows Libarchive RCE https://t.co/UECZFSUpED #Pentesting #Windows #CyberSecurity #Infosec https://t.co/PzbQIMpOi2
@ptracesecurity
9 Nov 2024
1061 Impressions
6 Retweets
15 Likes
6 Bookmarks
0 Replies
0 Quotes
Patch diffing CVE-2024-20696 (integer overflow vulnerability in the Libarchive library) https://t.co/dextETvFy5 Credits @clearbluejar #windows #infosec https://t.co/Np2uklt8JD
@0xor0ne
8 Nov 2024
5680 Impressions
27 Retweets
135 Likes
52 Bookmarks
6 Replies
0 Quotes
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB2C6F0A-4519-43AE-A36D-39F968FF3DCD", "versionEndExcluding": "10.0.17763.5329" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "26D9519C-EC1F-48D1-89F5-2DCBF84C8251", "versionEndExcluding": "10.0.19044.3930" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B9B6C6A0-6A10-4A8B-9DF2-D00CE5F863BD", "versionEndExcluding": "10.0.19045.3930" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "290AE500-245E-4C97-953C-05D679164894", "versionEndExcluding": "10.0.22000.2713" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8145E3A1-AA48-49CD-A391-8BA9F3860316", "versionEndExcluding": "10.0.22621.3007" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "04D7A1EA-2E86-4600-A7B8-DAA5ACABE8D0", "versionEndExcluding": "10.0.22631.3007" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51DCD313-6848-46DD-B4C6-DA2A8F6291CD", "versionEndExcluding": "10.0.17763.5329" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13224366-AD63-4CAD-85D1-F9599CFE1B14", "versionEndExcluding": "10.0.20348.2227" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B57577F-8313-4AFF-9E30-0C928D87C4AF", "versionEndExcluding": "10.0.25398.643" } ], "operator": "OR" } ] } ]