- Description
- Windows libarchive Remote Code Execution Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Modified
CVSS 3.1
- Type
- Secondary
- Base score
- 7.3
- Impact score
- 5.9
- Exploitability score
- 1.3
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-122
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
Windows Libarchive RCE patch diffing (CVE-2024-20696) https://t.co/dextETvFy5 Credits @clearbluejar #windows #infosec https://t.co/Y0zeKcpRa1
@0xor0ne
18 Jan 2025
4129 Impressions
17 Retweets
95 Likes
34 Bookmarks
0 Replies
1 Quote
libarchive-harness-win - CVE-2024-20696 Windows libarchive Remote Code Execution Vulnerability https://t.co/uIn0b5kdkh
@turne85540
1 Dec 2024
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Patch Tuesday Diffing: CVE-2024-20696 - Windows Libarchive RCE https://t.co/UECZFSUpED #Pentesting #Windows #CyberSecurity #Infosec https://t.co/RSFtzgr8o7
@ptracesecurity
29 Nov 2024
1157 Impressions
5 Retweets
14 Likes
7 Bookmarks
0 Replies
0 Quotes
Patch diffing CVE-2024-20696: Windows Libarchive RCE https://t.co/dextETvFy5 Credits @clearbluejar #windows #cybersecurity https://t.co/e9XiYzfnFP
@0xor0ne
28 Nov 2024
6386 Impressions
24 Retweets
109 Likes
31 Bookmarks
0 Replies
0 Quotes
Patch Tuesday Diffing: CVE-2024-20696 - Windows Libarchive RCE https://t.co/UECZFSUpED #Pentesting #Windows #CyberSecurity #Infosec https://t.co/PzbQIMpOi2
@ptracesecurity
9 Nov 2024
1061 Impressions
6 Retweets
15 Likes
6 Bookmarks
0 Replies
0 Quotes
Patch diffing CVE-2024-20696 (integer overflow vulnerability in the Libarchive library) https://t.co/dextETvFy5 Credits @clearbluejar #windows #infosec https://t.co/Np2uklt8JD
@0xor0ne
8 Nov 2024
5680 Impressions
27 Retweets
135 Likes
52 Bookmarks
6 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AB2C6F0A-4519-43AE-A36D-39F968FF3DCD",
"versionEndExcluding": "10.0.17763.5329"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "26D9519C-EC1F-48D1-89F5-2DCBF84C8251",
"versionEndExcluding": "10.0.19044.3930"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B9B6C6A0-6A10-4A8B-9DF2-D00CE5F863BD",
"versionEndExcluding": "10.0.19045.3930"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "290AE500-245E-4C97-953C-05D679164894",
"versionEndExcluding": "10.0.22000.2713"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8145E3A1-AA48-49CD-A391-8BA9F3860316",
"versionEndExcluding": "10.0.22621.3007"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "04D7A1EA-2E86-4600-A7B8-DAA5ACABE8D0",
"versionEndExcluding": "10.0.22631.3007"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "51DCD313-6848-46DD-B4C6-DA2A8F6291CD",
"versionEndExcluding": "10.0.17763.5329"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "13224366-AD63-4CAD-85D1-F9599CFE1B14",
"versionEndExcluding": "10.0.20348.2227"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0B57577F-8313-4AFF-9E30-0C928D87C4AF",
"versionEndExcluding": "10.0.25398.643"
}
],
"operator": "OR"
}
]
}
]