www.tenable.com
Open in
urlscan Pro
2606:4700::6810:3005
Public Scan
URL:
https://www.tenable.com/plugins/nessus/208303
Submission: On October 09 via api from IN — Scanned from CA
Submission: On October 09 via api from IN — Scanned from CA
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Policies OverviewSearchAWS ResourcesAzure ResourcesGCP ResourcesKubernetes Resources * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Policies OverviewSearchAWS ResourcesAzure ResourcesGCP ResourcesKubernetes Resources * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 208303 1. Nessus KB5044286: WINDOWS 10 LTS 1507 SECURITY UPDATE (OCTOBER 2024) HIGH NESSUS PLUGIN ID 208303 * Information * Dependencies * Dependents * Changelog SYNOPSIS The remote Windows host is affected by multiple vulnerabilities. DESCRIPTION The remote Windows host is missing security update 5044286. It is, therefore, affected by multiple vulnerabilities - Remote Desktop Client Remote Code Execution Vulnerability (CVE-2024-43599) - Remote Registry Service Elevation of Privilege Vulnerability (CVE-2024-43532) - Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability (CVE-2024-43519) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. SOLUTION Apply Security Update 5044286 SEE ALSO https://support.microsoft.com/help/5044286 PLUGIN DETAILS Severity: High ID: 208303 File Name: smb_nt_ms24_oct_5044286.nasl Version: 1.1 Type: local Agent: windows Family: Windows : Microsoft Bulletins Published: 10/8/2024 Updated: 10/8/2024 Supported Sensors: Nessus RISK INFORMATION CVSS V2 Risk Factor: Critical Base Score: 10 Temporal Score: 7.4 Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C CVSS Score Source: CVE-2024-43599 CVSS V3 Risk Factor: High Base Score: 8.8 Temporal Score: 7.7 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C VULNERABILITY INFORMATION CPE: cpe:/o:microsoft:windows_10_1507 Required KB Items: SMB/MS_Bulletin_Checks/Possible Exploit Ease: No known exploits are available Patch Publication Date: 10/8/2024 Vulnerability Publication Date: 10/8/2024 REFERENCE INFORMATION CVE: CVE-2024-30092, CVE-2024-37976, CVE-2024-37982, CVE-2024-37983, CVE-2024-38149, CVE-2024-43501, CVE-2024-43506, CVE-2024-43509, CVE-2024-43511, CVE-2024-43513, CVE-2024-43514, CVE-2024-43515, CVE-2024-43516, CVE-2024-43517, CVE-2024-43518, CVE-2024-43519, CVE-2024-43520, CVE-2024-43532, CVE-2024-43534, CVE-2024-43535, CVE-2024-43547, CVE-2024-43550, CVE-2024-43553, CVE-2024-43554, CVE-2024-43556, CVE-2024-43560, CVE-2024-43562, CVE-2024-43563, CVE-2024-43565, CVE-2024-43570, CVE-2024-43572, CVE-2024-43573, CVE-2024-43583, CVE-2024-43599 MSFT: MS24-5044286 MSKB: 5044286 * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance