- Description
- Windows Registry Elevation of Privilege Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 5.9
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
- nvd@nist.gov
- NVD-CWE-noinfo
- secure@microsoft.com
- CWE-367
- Hype score
- Not currently trending
برای سیستم عامل ویندوز آسیب پذیری با کد CVE-2024-43452 و از نوع privilege escalation منتشر شده است. این آسیب پذیری مربوط به Registry در ویندوز می باشد و poc آن نیز منتشر شده است . برای اکسپلویت شدن این آسیب پذیری نیازی به Interaction توسط کاربر نیست. https://t.co/Poz3aKY03t https
@AmirHossein_sec
12 Jan 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43452 PoC Detection PoC: https://t.co/THN1yAC2w5 https://t.co/9g0J9JgXkv
@0x534c
7 Jan 2025
5838 Impressions
19 Retweets
66 Likes
37 Bookmarks
1 Reply
0 Quotes
A new Windows vulnerability (CVE-2024-43452) allows attackers SYSTEM access via a registry flaw. A patch is available now. Stay vigilant! 🔒 #Microsoft #WindowsSecurity #CVE2024 #CybersecurityNews link: https://t.co/iyxFeYXc65 https://t.co/htCRipXKnc
@TweetThreatNews
6 Jan 2025
34 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Security researchers published the technical details and a proof-of-concept (PoC) exploit code for CVE-2024-43452 (CVSS 7.5), a Windows Registry Elevation of Privilege vulnerability. Reported by Mateusz Jurczyk of Google Project Zero, this flaw exploits a design oversight in… h
@cybertzar
6 Jan 2025
43 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Test it, now CVE-2024-43452 PoC Exploit Released for Windows Elevation of Privilege Bug
@byt3n33dl3
6 Jan 2025
43 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43452: PoC Exploit Released for Windows Elevation of Privilege Bug Windows registry hive memory management, potentially allowing attackers to gain SYSTEM-level access on vulnerable machines. https://t.co/EdfW9iHUaQ
@B0ySie7e
6 Jan 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43452: Windows Registry'deki Yetki Yükseltme Açığı İçin PoC Exploit Yayınlandı https://t.co/gOkF5Y0Ngr
@cyberwebeyeos
6 Jan 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43452: PoC Exploit Released for Windows Elevation of Privilege Bug https://t.co/n3Wbs2Je4b
@wy88215534
6 Jan 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43452: PoC Exploit Released for Windows Elevation of Privilege Bug https://t.co/uZqo3NXqFq
@Dinosn
6 Jan 2025
5675 Impressions
40 Retweets
136 Likes
37 Bookmarks
0 Replies
0 Quotes
#Vulnerability #Windows CVE-2024-43452: PoC Exploit Released for Windows Elevation of Privilege Bug https://t.co/vTjauXmCRo
@Komodosec
6 Jan 2025
70 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43452: PoC Exploit Released for Windows Elevation of Privilege Bug Security researchers published the technical details and a PoC exploit code for CVE-2024-43452, a Windows Registry Elevation of Privilege flaw https://t.co/loteG6FvHG
@the_yellow_fall
6 Jan 2025
19 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
I had the privilege of hanging out with @j00ru at @reconmtl after my talk about False File Immutability. I just found out that his latest work, CVE-2024-43452, was directly inspired by my research and our chat. Feels good man. https://t.co/9mKp5yZbgz
@GabrielLandau
5 Dec 2024
5248 Impressions
10 Retweets
58 Likes
18 Bookmarks
0 Replies
0 Quotes
I had the privilege of hanging out with @j00ru's at @reconmtl after my talk about False File Immutability. I just found out that his latest work, CVE-2024-43452, was directly inspired by my research and our chat. Feels good man. https://t.co/9mKp5yZbgz
@GabrielLandau
5 Dec 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43452 Windows Registry Elevation of Privilege Vulnerability https://t.co/hwXboq7AHa
@CVEnew
12 Nov 2024
238 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "81C732A1-CC0F-4633-B00D-473869E77DB9",
"versionEndExcluding": "10.0.17763.6532"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "AF9C20B8-CB5E-46C9-B041-D6A42C26703B",
"versionEndExcluding": "10.0.17763.6532"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "71AD0B79-C3EF-4E13-AB04-D5FAEABA6954",
"versionEndExcluding": "10.0.19044.5131"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "B35413A3-DE3B-4E35-AB48-C6D5D138AC07",
"versionEndExcluding": "10.0.19044.5131"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "D0558F5F-A561-41E9-9242-7F4A5D924479",
"versionEndExcluding": "10.0.19044.5131"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "EA243DE7-EDB1-43DA-AD7E-541843DECB58",
"versionEndExcluding": "10.0.19045.5131"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "5D428E06-FC7C-4151-9582-D66D05D7AFE6",
"versionEndExcluding": "10.0.19045.5131"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "FB49C811-F4D7-46EB-9ED6-50CB3EAAAD90",
"versionEndExcluding": "10.0.19045.5131"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "04BC0915-6F14-4D7A-951F-83CBAB47C3C4",
"versionEndExcluding": "10.0.22621.4460"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "8A16CFCB-D002-4F63-B568-9D14ACE88E94",
"versionEndExcluding": "10.0.22621.4460"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "B8FE14E5-7226-43CA-A57E-A81636185AD4",
"versionEndExcluding": "10.0.22631.4460"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "97507261-3969-4EBF-BCED-93FBADCBB6DC",
"versionEndExcluding": "10.0.22631.4460"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"vulnerable": true,
"matchCriteriaId": "D32C04CA-E5BE-47CA-AF79-B39859288531",
"versionEndExcluding": "10.0.26100.2314"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "40A6B92E-21C6-4BDD-BA57-DC227FF0F998",
"versionEndExcluding": "10.0.26100.2314"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A43E1F6C-B2A7-4DEC-B4EC-04153746C42B",
"versionEndExcluding": "10.0.17763.6532"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641",
"versionEndExcluding": "10.0.20348.2849"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975",
"versionEndExcluding": "10.0.25398.1251"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054",
"versionEndExcluding": "10.0.26100.2314"
}
],
"operator": "OR"
}
]
}
]