BDU:2025-13277

Vulnerability from fstec - Published: 14.10.2025
VLAI Severity ?
Title
Уязвимость службы удаленного рабочего стола Remote Desktop Services (RDS) операционных систем Windows, позволяющая нарушителю выполнить произвольный код
Description
Уязвимость службы удаленного рабочего стола Remote Desktop Services (RDS) операционных систем Windows связана с использованием памяти после её освобождения. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, выполнить произвольный код
Vendor
Microsoft Corp
Software Name
Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 Service Pack 2 (Server Core Installation), Windows Server 2008 Service Pack 2, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 (Server Core installation), Windows Server 2012, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows 10 1607, Windows 10, Windows Server 2025, Windows 11 24H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 23H2, Windows Server 2025 (Server Core installation), Windows 10 22H2, Windows 11 22H2, Windows 10 21H2, Windows Server 2022 (Server Core installation), Windows Server 2022, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows 10 1809, Windows 11 25H2, Windows App Client, Microsoft Remote Desktop client for Windows Desktop
Software Version
до 6.1.7601.27974 (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), до 6.1.7601.27974 (Windows Server 2008 R2 Service Pack 1), до 6.0.6003.23571 (Windows Server 2008 Service Pack 2 (Server Core Installation)), до 6.0.6003.23571 (Windows Server 2008 Service Pack 2), до 6.3.9600.22824 (Windows Server 2012 R2 (Server Core installation)), до 6.3.9600.22824 (Windows Server 2012 R2), до 6.2.9200.25722 (Windows Server 2012 (Server Core installation)), до 6.2.9200.25722 (Windows Server 2012), до 10.0.14393.8519 (Windows Server 2016 (Server Core installation)), до 10.0.14393.8519 (Windows Server 2016), до 10.0.14393.8519 (Windows 10 1607), до 10.0.10240.21161 (Windows 10), до 10.0.26100.6899 (Windows Server 2025), до 10.0.26100.6899 (Windows 11 24H2), до 10.0.25398.1913 (Windows Server 2022, 23H2 Edition (Server Core installation)), до 10.0.22631.6060 (Windows 11 23H2), до 10.0.26100.6899 (Windows Server 2025 (Server Core installation)), до 10.0.19045.6456 (Windows 10 22H2), до 10.0.22621.6060 (Windows 11 22H2), до 10.0.19044.6456 (Windows 10 21H2), до 10.0.20348.4294 (Windows Server 2022 (Server Core installation)), до 10.0.20348.4294 (Windows Server 2022), до 10.0.17763.7919 (Windows Server 2019 (Server Core installation)), до 10.0.17763.7919 (Windows Server 2019), до 10.0.17763.7919 (Windows 10 1809), до 10.0.26200.6899 (Windows 11 25H2), до 2.0.706.0 (Windows App Client), до 1.2.6599.0 (Microsoft Remote Desktop client for Windows Desktop)
Possible Mitigations
Использование рекомендаций производителя: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718
Reference
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718
CWE
CWE-416

{
  "CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
  "CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO2317, TO2318, TO2319, TO2341, TO2342, TO2343",
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO2317 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066586), TO2318 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2016 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066836), TO2319 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066586), TO2341 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 11 22H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066793), TO2342 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 11 23H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066793), TO2343 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 11 24H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5066835)",
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 6.1.7601.27974 (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), \u0434\u043e 6.1.7601.27974 (Windows Server 2008 R2 Service Pack 1), \u0434\u043e 6.0.6003.23571 (Windows Server 2008 Service Pack 2 (Server Core Installation)), \u0434\u043e 6.0.6003.23571 (Windows Server 2008 Service Pack 2), \u0434\u043e 6.3.9600.22824 (Windows Server 2012 R2 (Server Core installation)), \u0434\u043e 6.3.9600.22824 (Windows Server 2012 R2), \u0434\u043e 6.2.9200.25722 (Windows Server 2012 (Server Core installation)), \u0434\u043e 6.2.9200.25722 (Windows Server 2012), \u0434\u043e 10.0.14393.8519 (Windows Server 2016 (Server Core installation)), \u0434\u043e 10.0.14393.8519 (Windows Server 2016), \u0434\u043e 10.0.14393.8519 (Windows 10 1607), \u0434\u043e 10.0.10240.21161 (Windows 10), \u0434\u043e 10.0.26100.6899 (Windows Server 2025), \u0434\u043e 10.0.26100.6899 (Windows 11 24H2), \u0434\u043e 10.0.25398.1913 (Windows Server 2022, 23H2 Edition (Server Core installation)), \u0434\u043e 10.0.22631.6060 (Windows 11 23H2), \u0434\u043e 10.0.26100.6899 (Windows Server 2025 (Server Core installation)), \u0434\u043e 10.0.19045.6456 (Windows 10 22H2), \u0434\u043e 10.0.22621.6060 (Windows 11 22H2), \u0434\u043e 10.0.19044.6456 (Windows 10 21H2), \u0434\u043e 10.0.20348.4294 (Windows Server 2022 (Server Core installation)), \u0434\u043e 10.0.20348.4294 (Windows Server 2022), \u0434\u043e 10.0.17763.7919 (Windows Server 2019 (Server Core installation)), \u0434\u043e 10.0.17763.7919 (Windows Server 2019), \u0434\u043e 10.0.17763.7919 (Windows 10 1809), \u0434\u043e 10.0.26200.6899 (Windows 11 25H2), \u0434\u043e 2.0.706.0 (Windows App Client), \u0434\u043e 1.2.6599.0 (Microsoft Remote Desktop client for Windows Desktop)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "14.10.2025",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.10.2025",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "23.10.2025",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-13277",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-58718",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 Service Pack 2 (Server Core Installation), Windows Server 2008 Service Pack 2, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 (Server Core installation), Windows Server 2012, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows 10 1607, Windows 10, Windows Server 2025, Windows 11 24H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 23H2, Windows Server 2025 (Server Core installation), Windows 10 22H2, Windows 11 22H2, Windows 10 21H2, Windows Server 2022 (Server Core installation), Windows Server 2022, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows 10 1809, Windows 11 25H2, Windows App Client, Microsoft Remote Desktop client for Windows Desktop",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows Server 2008 R2 Service Pack 1 (Server Core installation) \u0434\u043e 6.1.7601.27974 64-bit, Microsoft Corp Windows Server 2008 R2 Service Pack 1 \u0434\u043e 6.1.7601.27974 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 (Server Core Installation) \u0434\u043e 6.0.6003.23571 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 (Server Core Installation) \u0434\u043e 6.0.6003.23571 32-bit, Microsoft Corp Windows Server 2008 Service Pack 2 \u0434\u043e 6.0.6003.23571 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 \u0434\u043e 6.0.6003.23571 32-bit, Microsoft Corp Windows Server 2012 R2 (Server Core installation) \u0434\u043e 6.3.9600.22824 , Microsoft Corp Windows Server 2012 R2 \u0434\u043e 6.3.9600.22824 , Microsoft Corp Windows Server 2012 (Server Core installation) \u0434\u043e 6.2.9200.25722 , Microsoft Corp Windows Server 2012 \u0434\u043e 6.2.9200.25722 , Microsoft Corp Windows Server 2016 (Server Core installation) \u0434\u043e 10.0.14393.8519 , Microsoft Corp Windows Server 2016 \u0434\u043e 10.0.14393.8519 , Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8519 64-bit, Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8519 32-bit, Microsoft Corp Windows 10 \u0434\u043e 10.0.10240.21161 64-bit, Microsoft Corp Windows 10 \u0434\u043e 10.0.10240.21161 32-bit, Microsoft Corp Windows Server 2025 \u0434\u043e 10.0.26100.6899 , Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.6899 64-bit, Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.6899 ARM64, Microsoft Corp Windows Server 2022, 23H2 Edition (Server Core installation) \u0434\u043e 10.0.25398.1913 , Microsoft Corp Windows 11 23H2 \u0434\u043e 10.0.22631.6060 64-bit, Microsoft Corp Windows 11 23H2 \u0434\u043e 10.0.22631.6060 ARM64, Microsoft Corp Windows Server 2025 (Server Core installation) \u0434\u043e 10.0.26100.6899 , Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6456 32-bit, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6456 ARM64, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6456 64-bit, Microsoft Corp Windows 11 22H2 \u0434\u043e 10.0.22621.6060 64-bit, Microsoft Corp Windows 11 22H2 \u0434\u043e 10.0.22621.6060 ARM64, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6456 64-bit, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6456 ARM64, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6456 32-bit, Microsoft Corp Windows Server 2022 (Server Core installation) \u0434\u043e 10.0.20348.4294 , Microsoft Corp Windows Server 2022 \u0434\u043e 10.0.20348.4294 , Microsoft Corp Windows Server 2019 (Server Core installation) \u0434\u043e 10.0.17763.7919 , Microsoft Corp Windows Server 2019 \u0434\u043e 10.0.17763.7919 , Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.7919 64-bit, Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.7919 32-bit, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26200.6899 64-bit, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26200.6899 ARM64",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u0441\u0442\u043e\u043b\u0430 Remote Desktop Services (RDS) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043b\u0443\u0436\u0431\u044b \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u0441\u0442\u043e\u043b\u0430 Remote Desktop Services (RDS) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58718",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 8,8)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…