www.tenable.com
Open in
urlscan Pro
2606:4700::6810:3005
Public Scan
URL:
https://www.tenable.com/plugins/nessus/206893
Submission: On November 20 via api from IN — Scanned from DE
Submission: On November 20 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
* * Plugins * Settings LINKS Tenable Cloud Tenable Community & Support Tenable University Severity VPRCVSS v2CVSS v3CVSS v4 Theme LightDarkAuto Help * * Plugins OverviewPlugins PipelineNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin FamiliesRelease Notes * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch * Links Tenable CloudTenable Community & SupportTenable University * Settings Severity VPRCVSS v2CVSS v3CVSS v4 Theme LightDarkAuto DETECTIONS * Plugins OverviewPlugins PipelineRelease NotesNewestUpdatedSearchNessus FamiliesWAS FamiliesNNM FamiliesLCE FamiliesTenable OT Security FamiliesAbout Plugin Families * Audits OverviewNewestUpdatedSearch Audit FilesSearch ItemsReferencesAuthoritiesDocumentationDownload All Audit Files * Indicators OverviewSearchIndicators of AttackIndicators of Exposure ANALYTICS * CVEs OverviewNewestUpdatedSearch * Attack Path Techniques OverviewSearch 1. Plugins 2. Nessus 3. 206893 1. Nessus KB5043067: WINDOWS 11 VERSION 21H2 SECURITY UPDATE (SEPTEMBER 2024) CRITICAL NESSUS PLUGIN ID 206893 Language: English 日本語简体中文繁體中文English * Information * Dependencies * Dependents * Changelog SYNOPSIS The remote Windows host is affected by multiple vulnerabilities. DESCRIPTION The remote Windows host is missing security update 5043067. It is, therefore, affected by multiple vulnerabilities - Windows MSHTML Platform Spoofing Vulnerability (CVE-2024-43461) - Microsoft Management Console Remote Code Execution Vulnerability (CVE-2024-38259) - Windows Remote Access Connection Manager Elevation of Privilege Vulnerability (CVE-2024-38240) Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number. SOLUTION Apply Security Update 5043067 SEE ALSO https://support.microsoft.com/help/5043067 PLUGIN DETAILS Severity: Critical ID: 206893 File Name: smb_nt_ms24_sep_5043067.nasl Version: 1.8 Type: local Agent: windows Family: Windows : Microsoft Bulletins Published: 9/10/2024 Updated: 10/11/2024 Supported Sensors: Nessus RISK INFORMATION VPR Risk Factor: Critical Score: 9.2 CVSS V2 Risk Factor: Critical Base Score: 10 Temporal Score: 8.3 Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C CVSS Score Source: CVE-2024-43461 CVSS V3 Risk Factor: Critical Base Score: 9.8 Temporal Score: 9.1 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C CVSS Score Source: CVE-2024-38240 VULNERABILITY INFORMATION CPE: cpe:/o:microsoft:windows_11_21h2 Required KB Items: SMB/MS_Bulletin_Checks/Possible Exploit Available: true Exploit Ease: Exploits are available Patch Publication Date: 9/10/2024 Vulnerability Publication Date: 9/10/2024 CISA Known Exploited Vulnerability Due Dates: 10/1/2024, 10/7/2024 REFERENCE INFORMATION CVE: CVE-2024-21416, CVE-2024-30073, CVE-2024-38014, CVE-2024-38045, CVE-2024-38046, CVE-2024-38119, CVE-2024-38217, CVE-2024-38234, CVE-2024-38235, CVE-2024-38237, CVE-2024-38238, CVE-2024-38239, CVE-2024-38240, CVE-2024-38241, CVE-2024-38242, CVE-2024-38243, CVE-2024-38244, CVE-2024-38245, CVE-2024-38246, CVE-2024-38247, CVE-2024-38248, CVE-2024-38249, CVE-2024-38250, CVE-2024-38252, CVE-2024-38253, CVE-2024-38254, CVE-2024-38257, CVE-2024-38259, CVE-2024-43461 IAVA: 2024-A-0575-S, 2024-A-0576-S MSFT: MS24-5043067 MSKB: 5043067 * Tenable.com * Community & Support * Documentation * Education * © 2024 Tenable®, Inc. All Rights Reserved * Privacy Policy * Legal * 508 Compliance