www.tenable.com
Open in
urlscan Pro
2606:4700::6810:3105
Public Scan
URL:
https://www.tenable.com/plugins/nessus/212240
Submission: On December 12 via api from IN — Scanned from US
Submission: On December 12 via api from IN — Scanned from US
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3CVSS v4 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3CVSS v4 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 212240 1. Nessus KB5048676: WINDOWS SERVER 2008 R2 SECURITY UPDATE (DECEMBER 2024) CRITICAL NESSUS PLUGIN ID 212240 * Information * Dependencies * Dependents * Changelog SYNOPSIS The remote Windows host is affected by multiple vulnerabilities. DESCRIPTION The remote Windows host is missing security update 5048676. It is, therefore, affected by multiple vulnerabilities - Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2024-49090) - Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability (CVE-2024-49112) - Windows Common Log File System Driver Elevation of Privilege Vulnerability (CVE-2024-49138) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. SOLUTION Apply Security Update 5048676 or Cumulative Update 5048695 SEE ALSO https://support.microsoft.com/help/5048676 https://support.microsoft.com/help/5048695 PLUGIN DETAILS Severity: Critical ID: 212240 File Name: smb_nt_ms24_dec_5048676.nasl Version: 1.3 Type: local Agent: windows Family: Windows : Microsoft Bulletins Published: 12/10/2024 Updated: 12/12/2024 Supported Sensors: Nessus Agent, Nessus RISK INFORMATION VPR Risk Factor: High Score: 8.4 CVSS V2 Risk Factor: Critical Base Score: 10 Temporal Score: 8.3 Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C CVSS Score Source: CVE-2024-49125 CVSS V3 Risk Factor: Critical Base Score: 9.8 Temporal Score: 9.1 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C CVSS Score Source: CVE-2024-49112 VULNERABILITY INFORMATION CPE: cpe:/o:microsoft:windows_server_2008:r2 Required KB Items: SMB/MS_Bulletin_Checks/Possible Exploit Available: true Exploit Ease: Exploits are available Patch Publication Date: 12/10/2024 Vulnerability Publication Date: 12/10/2024 CISA Known Exploited Vulnerability Due Dates: 12/31/2024 REFERENCE INFORMATION CVE: CVE-2024-49072, CVE-2024-49080, CVE-2024-49082, CVE-2024-49084, CVE-2024-49085, CVE-2024-49086, CVE-2024-49088, CVE-2024-49089, CVE-2024-49090, CVE-2024-49096, CVE-2024-49102, CVE-2024-49104, CVE-2024-49112, CVE-2024-49113, CVE-2024-49118, CVE-2024-49121, CVE-2024-49122, CVE-2024-49124, CVE-2024-49125, CVE-2024-49126, CVE-2024-49127, CVE-2024-49138 MSFT: MS24-5048676, MS24-5048695 MSKB: 5048676, 5048695 * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance