Overview
- Description
- Microsoft Management Console Remote Code Execution Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
- Severity
- HIGH
Known exploits
Data from CISA
- Vulnerability name
- Microsoft Windows Management Console Remote Code Execution Vulnerability
- Exploit added on
- Oct 8, 2024
- Exploit action due
- Oct 29, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
- secure@microsoft.com
- CWE-707
Social media
- Hype score
- Not currently trending
Actively exploited CVE : CVE-2024-43572
@transilienceai
5 Nov 2024
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-43572
@transilienceai
30 Oct 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 New vulnerability alert! CVE-2024-43572 in Microsoft MMC has been exploited, allowing remote code execution. Affected systems are at high risk. Ensure you apply the latest patches to mitigate potential attacks. For detailed insights, visit https://t.co/6lvMES4Gc0
@C9Journal
29 Oct 2024
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Critical Alert: Remote Code Execution Flaw in #Microsoft Management Console (#CVE-2024-43572) https://t.co/NuGbntJFnk
@UndercodeNews
29 Oct 2024
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Microsoft’s October update addresses 117 CVEs, including two actively exploited vulnerabilities: CVE-2024-43572 (RCE in MMC) CVE-2024-43573 (Platform Spoofing in MSHTML) Critical CVE-2024-43468 (CVSS 9.8) could lead to RCE on servers. Apply patches ASAP to stay secure! https:
@UpriteServices
24 Oct 2024
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-43573 is getting exploited #inthewild. Find out more at https://t.co/iXgTYADn4B CVE-2024-43572 is getting exploited #inthewild. Find out more at https://t.co/3fNkZBuraP CVE-2024-9380 is getting exploited #inthewild. Find out more at https://t.co/Ibnt21MaDk
@inthewildio
23 Oct 2024
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft’s October 2024 Patch Tuesday Addresses 117 CVEs (CVE-2024-43572, CVE-2024-43573) https://t.co/QpgQawRUUz https://t.co/0qqb9JgzYM
@dansantanna
22 Oct 2024
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-43572
@transilienceai
20 Oct 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Microsoft’s October 2024 Patch Tuesday Addresses 117 CVEs (CVE-2024-43572, CVE-2024-43573) https://t.co/DhrNs878pF https://t.co/G5hEfxKkkV
@Trej0Jass
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-43572
@transilienceai
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF", "versionEndExcluding": "10.0.10240.20796" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D", "versionEndExcluding": "10.0.10240.20796" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4", "versionEndExcluding": "10.0.14393.7428" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4", "versionEndExcluding": "10.0.14393.7428" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E73B5EB-3264-4FFD-A467-03F716E8B410", "versionEndExcluding": "10.0.17763.6414" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "vulnerable": true, "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE", "versionEndExcluding": "10.0.19044.5011" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8", "versionEndExcluding": "10.0.19044.5011" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75", "versionEndExcluding": "10.0.19044.5011" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "vulnerable": true, "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1", "versionEndExcluding": "10.0.19045.5011" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC", "versionEndExcluding": "10.0.19045.5011" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F", "versionEndExcluding": "10.0.19045.5011" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68801079-35D1-4489-A0AE-DA780FF4F9BC", "versionEndExcluding": "10.0.22000.3260" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E727AE65-9D9E-49BA-A875-9D50FAE9F7DB", "versionEndExcluding": "10.0.22621.4317" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "vulnerable": true, "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0", "versionEndExcluding": "10.0.22631.4317" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7", "versionEndExcluding": "10.0.22631.4317" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E07DF8B6-0DF9-4BF1-9C9B-4A29F9611C8A", "versionEndExcluding": "10.0.26100.2033" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x32:*", "vulnerable": true, "matchCriteriaId": "56DC72C1-E387-48FD-98AF-113A6C694C21" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "8968BAC8-A1DB-4F88-89F8-4BE47919C247" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7", "versionEndExcluding": "10.0.14393.7428" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D", "versionEndExcluding": "10.0.17763.6414" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AC8DD27D-4538-4CB9-894A-3BF3DFF9D25A", "versionEndExcluding": "10.0.20348..2762" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9", "versionEndExcluding": "10.0.25398.1189" } ], "operator": "OR" } ] } ]