{"vulnerability": "CVE-2024-43639", "sightings": [{"uuid": "728c815a-4ea2-4cba-b3b1-00efc6e48f20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://t.me/CyberBulletin/2486", "content": "\u26a1CVE-2024-43639: Remote Code Execution in Microsoft Windows KDC Proxy.\n\n#CyberBulletin", "creation_timestamp": "2025-03-05T13:48:31.000000Z"}, {"uuid": "ded234e4-18f8-4a8b-b40a-12ab13d27ee5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-43639", "type": "seen", "source": "", "content": "", "creation_timestamp": "2024-11-15T07:43:01.174603Z"}, {"uuid": "5c12c236-6ecd-4554-8207-4a7486cce58d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://infosec.exchange/users/patchnow24x7/statuses/113474917479791705", "content": "", "creation_timestamp": "2024-11-13T09:23:51.626497Z"}, {"uuid": "a2c8405f-b604-46ff-8ffb-63b65c8f4d87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "f86dc604-ea9d-4e21-913a-ae7a34e0b6b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/7140", "content": "#exploit\n1. SSHNuke Exploit\nhttps://blog.doyensec.com/2025/03/04/exploitable-sshd.html\n\n2. CVE-2024-43639:\nRCE in Microsoft Windows KDC Proxy\nhttps://www.zerodayinitiative.com/blog/2025/3/3/cve-2024-43639\n\n3. Private key extraction in ECDSA upon signing a malformed input\u00a0\nhttps://github.com/indutny/elliptic/security/advisories/GHSA-vjh7-7g9h-fjfh", "creation_timestamp": "2025-03-07T05:49:30.000000Z"}, {"uuid": "f68a6be2-380b-4899-91fa-619be7806066", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2690", "content": "#exploit\n1. SSHNuke Exploit\nhttps://blog.doyensec.com/2025/03/04/exploitable-sshd.html\n\n2. CVE-2024-43639:\nRCE in Microsoft Windows KDC Proxy\nhttps://www.zerodayinitiative.com/blog/2025/3/3/cve-2024-43639\n\n3. Private key extraction in ECDSA upon signing a malformed input\u00a0\nhttps://github.com/indutny/elliptic/security/advisories/GHSA-vjh7-7g9h-fjfh", "creation_timestamp": "2025-03-07T05:49:31.000000Z"}, {"uuid": "4eb3061d-1a1b-4a7c-a2c0-e28fb36f9054", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://social.cologne/users/pterlisten/statuses/113519277048451096", "content": "", "creation_timestamp": "2024-11-21T05:25:04.986674Z"}, {"uuid": "c24951f7-42fa-48e7-b058-28886e03a92c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ljlc6fo3dd2t", "content": "", "creation_timestamp": "2025-03-04T20:22:39.700026Z"}, {"uuid": "010775c8-8962-457b-9a73-8f39e04ae2d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://www.thezdi.com/blog/2025/3/3/cve-2024-43639", "content": "", "creation_timestamp": "2025-03-04T16:02:27.000000Z"}, {"uuid": "a38c8785-870f-4abb-a65d-4fc019dbc72d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljll2tvq532t", "content": "", "creation_timestamp": "2025-03-04T23:01:43.968850Z"}, {"uuid": "b802cabd-3404-49b7-894a-22fb81f715ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://t.me/kasperskyb2b/1499", "content": "\ud83d\udcbb \u041d\u043e\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u0439 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043f\u0430\u0442\u0447\u0435\u0439: \u0438\u0434\u0451\u043c \u043d\u0430 \u0440\u0435\u043a\u043e\u0440\u0434?\n\n\u0421\u0432\u0435\u0436\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Microsoft \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u0442 92 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0434\u0432\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0432\u0436\u0438\u0432\u0443\u044e \u0438 \u0447\u0435\u0442\u044b\u0440\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0451\u043d\u043d\u044b\u0435 \u0434\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f. \u0427\u0435\u0442\u044b\u0440\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u043c\u0435\u044e\u0442 \u0441\u0442\u0430\u0442\u0443\u0441 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445. 52 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u043b\u0438 \u043a  RCE, 26 \u2014 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439,  1 \u2014 \u043a \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0442\u0430\u043a\u0436\u0435 \u0435\u0441\u0442\u044c 4 DoS \u0438 2 \u043e\u0431\u0445\u043e\u0434\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u0412 \u0446\u0435\u043b\u043e\u043c \u0437\u0430 \u044d\u0442\u043e\u0442 \u0433\u043e\u0434 \u0420\u0435\u0434\u043c\u043e\u043d\u0434 \u0432\u044b\u043a\u0430\u0442\u0438\u043b \u0443\u0436\u0435 \u043f\u043e\u0447\u0442\u0438 950 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0442\u0430\u043a \u0447\u0442\u043e \u043f\u043e\u0441\u043b\u0435 \u0434\u0435\u043a\u0430\u0431\u0440\u044c\u0441\u043a\u043e\u0433\u043e \u043f\u0430\u043a\u0435\u0442\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0433\u043e\u0434 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0440\u0435\u043a\u043e\u0440\u0434\u043d\u044b\u043c \u043f\u043e \u0447\u0438\u0441\u043b\u0443 \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0445 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432.\n\n\u0412 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f:\nCVE-2024-43451 (CVSS 6.5) \u2014 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u043f\u0440\u0438\u0432\u0435\u0442 \u043e\u0442 Internet Explorer, \u0443\u0442\u0435\u0447\u043a\u0430 \u0445\u044d\u0448\u0435\u0439 NTLMv2 \u0447\u0435\u0440\u0435\u0437 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 MSHTML. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0434\u043e\u043b\u0436\u0435\u043d \u043a\u043b\u0438\u043a\u043d\u0443\u0442\u044c \u043d\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0444\u0430\u0439\u043b (\u043d\u0435 \u043e\u0442\u043a\u0440\u044b\u0442\u044c, \u0430 \u043f\u0440\u043e\u0441\u0442\u043e \u0432\u044b\u0431\u0440\u0430\u0442\u044c \u0435\u0433\u043e).\nCVE-2024-49039 (CVSS 8.8)\u2014 \u043f\u043e\u0431\u0435\u0433 \u0438\u0437 AppContainer,  \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e Medium integrity.\n\u041f\u0440\u043e \u043e\u0431\u0430 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u043f\u043e\u043a\u0430 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u043a\u0442\u043e \u0438\u043c\u0435\u043d\u043d\u043e \u0438 \u043a\u0430\u043a \u0438\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b, \u043d\u043e \u0432\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b \u043d\u0430\u0439\u0434\u0435\u043d \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u043c\u0438 \u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043e\u0434\u043d\u0430 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u2014 Google TAG, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u0441\u0432\u0438\u0434\u0435\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e\u0432\u0430\u0442\u044c \u043e\u0431 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0448\u0438\u0440\u043e\u043a\u043e\u043c \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0438 \u044d\u0442\u043e\u0433\u043e \u0437\u0438\u0440\u043e\u0434\u0435\u044f \u043a\u0430\u043a\u0438\u043c\u0438-\u0442\u043e \u043a\u0440\u0443\u043f\u043d\u044b\u043c\u0438 APT.  \n\n\u0420\u0430\u0437\u0433\u043b\u0430\u0448\u0451\u043d\u043d\u044b\u043c\u0438 Microsoft \u0441\u0447\u0438\u0442\u0430\u0435\u0442\nCVE-2024-49019 (CVSS 7.8) EoP \u0432 Active Directory Certificate Service, \u043e\u043d\u0430 \u0436\u0435 EKUwu.\nCVE-2024-49040 (CVSS 7.5) spoofing \u0432 Exchange. \u041f\u0438\u0441\u044c\u043c\u0430 \u0441 \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u043c \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u043e\u043c P2 FROM \u043c\u043e\u0433\u0443\u0442 \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0430\u0442\u044c\u0441\u044f \u0441 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u043c \u0430\u0434\u0440\u0435\u0441\u043e\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044f. Microsoft \u0441\u0447\u0438\u0442\u0430\u0435\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u043d\u0435 \u0437\u0430 \u0433\u043e\u0440\u0430\u043c\u0438 \u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \n\n\u0412\u043f\u0440\u043e\u0447\u0435\u043c, ZDI \u0441\u0447\u0438\u0442\u0430\u044e\u0442 \u0442\u0430\u043a\u0436\u0435 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u0435\u0449\u0451 \u0434\u0432\u0430 CVE \u0438\u0437 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f:\n\u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e RCE \u0432 .NET \u0438 VSCode (CVE-2024-43498, CVSS 9.8) \u0438 RCE \u0432 OpenSSL ( CVE-2024-5535, CVSS 9.2).\n\n\u0421\u0440\u0435\u0434\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u0431\u044b\u043b\u0438 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u044b, \u043c\u0443\u0440\u0430\u0448\u043a\u0438 \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 CVE-2024-43639, RCE \u0432 Kerberos \u0441\u043e \u0441\u043a\u0440\u043e\u043c\u043d\u044b\u043c CVSS 9.8 \u2014 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0441\u0435 Windows Server, \u043a\u043e\u0434 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f \u0441 \u0432\u044b\u0441\u043e\u043a\u0438\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438, \u0430 \u0432\u043e\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u0434\u0430\u0436\u0435 \u0431\u044b\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c. \u041f\u0440\u0430\u0432\u0434\u0430, \u0420\u0435\u0434\u043c\u043e\u043d\u0434 \u043e\u0431\u043d\u0430\u0434\u0451\u0436\u0438\u0432\u0430\u0435\u0442, \u0447\u0442\u043e exploitation less likely.  \n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #Microsoft @\u041f2\u0422", "creation_timestamp": "2024-11-13T10:53:26.000000Z"}, {"uuid": "aef8c4f2-949b-4d4a-bc2e-fc4ee382d7db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11893", "content": "#exploit\n1. SSHNuke Exploit\nhttps://blog.doyensec.com/2025/03/04/exploitable-sshd.html\n\n2. CVE-2024-43639:\nRCE in Microsoft Windows KDC Proxy\nhttps://www.zerodayinitiative.com/blog/2025/3/3/cve-2024-43639\n\n3. Private key extraction in ECDSA upon signing a malformed input\u00a0\nhttps://github.com/indutny/elliptic/security/advisories/GHSA-vjh7-7g9h-fjfh", "creation_timestamp": "2025-03-06T12:59:52.000000Z"}, {"uuid": "850a9c1e-3db9-42c9-9a2c-05e00cef26a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://www.thezdi.com/blog/2024/11/12/the-november-2024-security-update-review", "content": "", "creation_timestamp": "2024-11-12T18:26:35.000000Z"}, {"uuid": "ef36fb0d-2aa5-4e3b-b467-7155f1676ee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113471740875187261", "content": "", "creation_timestamp": "2024-11-12T19:55:59.821392Z"}, {"uuid": "6c463dfd-4a90-4723-aa88-6e9aff576550", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43639", "type": "seen", "source": "https://bsky.app/profile/thezdi.bsky.social/post/3ljkx4mu7jc2h", "content": "", "creation_timestamp": "2025-03-04T17:04:51.107326Z"}]}