Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-55414 (GCVE-0-2024-55414)
Vulnerability from cvelistv5 – Published: 2025-01-07 00:00 – Updated: 2025-01-08 15:26- n/a
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-55414",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-08T15:25:20.708213Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-08T15:26:42.619Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-07T17:38:15.736094",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://us.motorola.com/"
},
{
"url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55414/CVE-2024-55414_SmSerl64.sys_README.md"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2024-55414",
"datePublished": "2025-01-07T00:00:00",
"dateReserved": "2024-12-06T00:00:00",
"dateUpdated": "2025-01-08T15:26:42.619Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-55414\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-08T15:25:20.708213Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-77\", \"description\": \"CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-08T15:26:36.690Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://us.motorola.com/\"}, {\"url\": \"https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55414/CVE-2024-55414_SmSerl64.sys_README.md\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2025-01-07T17:38:15.736094\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-55414\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-08T15:26:42.619Z\", \"dateReserved\": \"2024-12-06T00:00:00\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2025-01-07T00:00:00\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2026-AVI-0044
Vulnerability from certfr_avis - Published: 2026-01-14 - Updated: 2026-01-14
De multiples vulnérabilités ont été découvertes dans Microsoft Windows. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Microsoft indique que la vulnérabilité CVE-2026-20805 est activement exploitée.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes x64 versions antérieures à 10.0.14393.8783 | ||
| Microsoft | Windows | Windows Server 2016 versions antérieures à 10.0.14393.8783 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes x64 versions antérieures à 10.0.19045.6809 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes x64 versions antérieures à 10.0.22631.6491 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes ARM64 versions antérieures à 10.0.19044.6809 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.32230 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 versions antérieures à 6.0.6003.23717 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes x64 versions antérieures à 10.0.17763.8276 | ||
| Microsoft | Windows | Windows Server 2012 versions antérieures à 6.2.9200.25868 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes x64 Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23717 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes x64 versions antérieures à 10.0.19044.6809 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes x64 versions antérieures à 10.0.26100.7623 | ||
| Microsoft | Windows | Windows 10 Version 1809 pour systèmes 32 bits versions antérieures à 10.0.17763.8276 | ||
| Microsoft | Windows | Windows Server 2016 (Server Core installation) versions antérieures à 10.0.14393.8783 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes ARM64 versions antérieures à 10.0.19045.6809 | ||
| Microsoft | Windows | Windows Server 2012 R2 (Server Core installation) versions antérieures à 6.3.9600.22968 | ||
| Microsoft | Windows | Windows 11 Version 25H2 pour systèmes ARM64 versions antérieures à 10.0.26200.7623 | ||
| Microsoft | Windows | Windows 10 Version 1607 pour systèmes 32 bits versions antérieures à 10.0.14393.8783 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.7623 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 versions antérieures à 6.0.6003.23717 | ||
| Microsoft | Windows | Windows Server 2022 versions antérieures à 10.0.20348.4648 | ||
| Microsoft | Windows | Windows Server 2008 pour systèmes 32 bits Service Pack 2 (Server Core installation) versions antérieures à 6.0.6003.23717 | ||
| Microsoft | Windows | Windows Admin Center in Azure Portal versions antérieures à 0.70.0.0 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 (Server Core installation) versions antérieures à 6.1.7601.28117 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.7623 | ||
| Microsoft | Windows | Windows Server 2025 versions antérieures à 10.0.26100.32230 | ||
| Microsoft | Windows | Windows Server 2012 R2 versions antérieures à 6.3.9600.22968 | ||
| Microsoft | Windows | Windows Server 2022 (Server Core installation) versions antérieures à 10.0.20348.4648 | ||
| Microsoft | Windows | Windows Server 2019 (Server Core installation) versions antérieures à 10.0.17763.8276 | ||
| Microsoft | Windows | Windows 11 Version 24H2 pour systèmes ARM64 versions antérieures à 10.0.26100.32230 | ||
| Microsoft | Windows | Windows Server 2022, 23H2 Edition (Server Core installation) versions antérieures à 10.0.25398.2092 | ||
| Microsoft | Windows | Windows 11 Version 25H2 pour systèmes x64 versions antérieures à 10.0.26200.7623 | ||
| Microsoft | Windows | Windows 10 Version 21H2 pour systèmes 32 bits versions antérieures à 10.0.19044.6809 | ||
| Microsoft | Windows | Windows Server 2019 versions antérieures à 10.0.17763.8276 | ||
| Microsoft | Windows | Windows 11 Version 23H2 pour systèmes ARM64 versions antérieures à 10.0.22631.6491 | ||
| Microsoft | Windows | Windows SDK versions antérieures à 10.0.26100.7463 | ||
| Microsoft | Windows | Windows Server 2012 (Server Core installation) versions antérieures à 6.2.9200.25868 | ||
| Microsoft | Windows | Windows Server 2008 R2 pour systèmes x64 Service Pack 1 versions antérieures à 6.1.7601.28117 | ||
| Microsoft | Windows | Windows 10 Version 22H2 pour systèmes 32 bits versions antérieures à 10.0.19045.6809 | ||
| Microsoft | Windows | Windows Server 2025 (Server Core installation) versions antérieures à 10.0.26100.7623 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.14393.8783",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 versions ant\u00e9rieures \u00e0 10.0.14393.8783",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19045.6809",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.22631.6491",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19044.6809",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.32230",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23717",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.17763.8276",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 versions ant\u00e9rieures \u00e0 6.2.9200.25868",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes x64 Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23717",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.19044.6809",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26100.7623",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1809 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.17763.8276",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2016 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.14393.8783",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.19045.6809",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.3.9600.22968",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26200.7623",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 1607 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.14393.8783",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.7623",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 versions ant\u00e9rieures \u00e0 6.0.6003.23717",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 versions ant\u00e9rieures \u00e0 10.0.20348.4648",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 pour syst\u00e8mes 32 bits Service Pack 2 (Server Core installation) versions ant\u00e9rieures \u00e0 6.0.6003.23717",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Admin Center in Azure Portal versions ant\u00e9rieures \u00e0 0.70.0.0",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 (Server Core installation) versions ant\u00e9rieures \u00e0 6.1.7601.28117",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.7623",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 versions ant\u00e9rieures \u00e0 10.0.26100.32230",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 R2 versions ant\u00e9rieures \u00e0 6.3.9600.22968",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.20348.4648",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.17763.8276",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 24H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.26100.32230",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2022, 23H2 Edition (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.25398.2092",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 25H2 pour syst\u00e8mes x64 versions ant\u00e9rieures \u00e0 10.0.26200.7623",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 21H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19044.6809",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2019 versions ant\u00e9rieures \u00e0 10.0.17763.8276",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 11 Version 23H2 pour syst\u00e8mes ARM64 versions ant\u00e9rieures \u00e0 10.0.22631.6491",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows SDK versions ant\u00e9rieures \u00e0 10.0.26100.7463",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2012 (Server Core installation) versions ant\u00e9rieures \u00e0 6.2.9200.25868",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2008 R2 pour syst\u00e8mes x64 Service Pack 1 versions ant\u00e9rieures \u00e0 6.1.7601.28117",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows 10 Version 22H2 pour syst\u00e8mes 32 bits versions ant\u00e9rieures \u00e0 10.0.19045.6809",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "Windows Server 2025 (Server Core installation) versions ant\u00e9rieures \u00e0 10.0.26100.7623",
"product": {
"name": "Windows",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-20831",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20831"
},
{
"name": "CVE-2026-20834",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20834"
},
{
"name": "CVE-2026-20853",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20853"
},
{
"name": "CVE-2023-31096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31096"
},
{
"name": "CVE-2026-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20918"
},
{
"name": "CVE-2026-20839",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20839"
},
{
"name": "CVE-2026-20920",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20920"
},
{
"name": "CVE-2026-20935",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20935"
},
{
"name": "CVE-2026-20965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20965"
},
{
"name": "CVE-2026-20924",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20924"
},
{
"name": "CVE-2026-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20852"
},
{
"name": "CVE-2026-20938",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20938"
},
{
"name": "CVE-2026-20871",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20871"
},
{
"name": "CVE-2026-20837",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20837"
},
{
"name": "CVE-2026-20826",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20826"
},
{
"name": "CVE-2026-20868",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20868"
},
{
"name": "CVE-2026-20824",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20824"
},
{
"name": "CVE-2026-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20843"
},
{
"name": "CVE-2026-20816",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20816"
},
{
"name": "CVE-2026-20829",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20829"
},
{
"name": "CVE-2026-20858",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20858"
},
{
"name": "CVE-2026-20847",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20847"
},
{
"name": "CVE-2026-20861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20861"
},
{
"name": "CVE-2026-20848",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20848"
},
{
"name": "CVE-2026-20940",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20940"
},
{
"name": "CVE-2026-20854",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20854"
},
{
"name": "CVE-2026-20818",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20818"
},
{
"name": "CVE-2026-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20838"
},
{
"name": "CVE-2026-20808",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20808"
},
{
"name": "CVE-2026-20929",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20929"
},
{
"name": "CVE-2026-20866",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20866"
},
{
"name": "CVE-2026-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20919"
},
{
"name": "CVE-2026-20867",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20867"
},
{
"name": "CVE-2026-20876",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20876"
},
{
"name": "CVE-2026-21221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21221"
},
{
"name": "CVE-2026-20840",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20840"
},
{
"name": "CVE-2026-20937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20937"
},
{
"name": "CVE-2026-20862",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20862"
},
{
"name": "CVE-2026-20827",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20827"
},
{
"name": "CVE-2026-20874",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20874"
},
{
"name": "CVE-2026-20865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20865"
},
{
"name": "CVE-2026-20835",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20835"
},
{
"name": "CVE-2026-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20811"
},
{
"name": "CVE-2026-20830",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20830"
},
{
"name": "CVE-2026-20857",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20857"
},
{
"name": "CVE-2026-20934",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20934"
},
{
"name": "CVE-2026-20810",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20810"
},
{
"name": "CVE-2026-20922",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20922"
},
{
"name": "CVE-2026-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0386"
},
{
"name": "CVE-2026-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20921"
},
{
"name": "CVE-2026-20833",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20833"
},
{
"name": "CVE-2026-20869",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20869"
},
{
"name": "CVE-2026-20804",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20804"
},
{
"name": "CVE-2026-20832",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20832"
},
{
"name": "CVE-2024-55414",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55414"
},
{
"name": "CVE-2026-20863",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20863"
},
{
"name": "CVE-2026-20815",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20815"
},
{
"name": "CVE-2026-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20836"
},
{
"name": "CVE-2026-20823",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20823"
},
{
"name": "CVE-2026-20877",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20877"
},
{
"name": "CVE-2026-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20873"
},
{
"name": "CVE-2026-20851",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20851"
},
{
"name": "CVE-2026-20939",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20939"
},
{
"name": "CVE-2026-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20932"
},
{
"name": "CVE-2026-20819",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20819"
},
{
"name": "CVE-2026-20872",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20872"
},
{
"name": "CVE-2026-20805",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20805"
},
{
"name": "CVE-2026-20844",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20844"
},
{
"name": "CVE-2026-20931",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20931"
},
{
"name": "CVE-2026-20820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20820"
},
{
"name": "CVE-2026-20809",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20809"
},
{
"name": "CVE-2026-20828",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20828"
},
{
"name": "CVE-2026-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21265"
},
{
"name": "CVE-2026-20927",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20927"
},
{
"name": "CVE-2026-20923",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20923"
},
{
"name": "CVE-2026-20875",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20875"
},
{
"name": "CVE-2026-20825",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20825"
},
{
"name": "CVE-2026-20870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20870"
},
{
"name": "CVE-2026-20860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20860"
},
{
"name": "CVE-2026-20849",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20849"
},
{
"name": "CVE-2026-20821",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20821"
},
{
"name": "CVE-2026-20941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20941"
},
{
"name": "CVE-2026-20822",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20822"
},
{
"name": "CVE-2026-20859",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20859"
},
{
"name": "CVE-2026-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21219"
},
{
"name": "CVE-2026-20812",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20812"
},
{
"name": "CVE-2026-20817",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20817"
},
{
"name": "CVE-2026-20962",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20962"
},
{
"name": "CVE-2026-20814",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20814"
},
{
"name": "CVE-2026-20925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20925"
},
{
"name": "CVE-2026-20856",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20856"
},
{
"name": "CVE-2026-20842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20842"
},
{
"name": "CVE-2026-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20926"
},
{
"name": "CVE-2026-20936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20936"
},
{
"name": "CVE-2026-20864",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20864"
}
],
"initial_release_date": "2026-01-14T00:00:00",
"last_revision_date": "2026-01-14T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0044",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Microsoft Windows. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.\n\nMicrosoft indique que la vuln\u00e9rabilit\u00e9 CVE-2026-20805 est activement exploit\u00e9e.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Microsoft Windows",
"vendor_advisories": [
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20918",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20918"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20927",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20927"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20858",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20858"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20812",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20812"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20820",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20820"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20805",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20805"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20822",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20822"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20929",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20929"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20854",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20854"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20842",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20842"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20821",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20821"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20853",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20853"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20808",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20808"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20827",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20827"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20804",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20804"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-21219",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21219"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20814",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20814"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20939",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20939"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20844",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20844"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-21221",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21221"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20923",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20923"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20843",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20843"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20810",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20810"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-21265",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21265"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20859",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20859"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20932",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20932"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20868",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20868"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20829",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20829"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20941",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20941"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20811",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20811"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20818",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20818"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20935",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20935"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20863",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20863"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20872",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20872"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20838",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20838"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20856",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20856"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20875",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20875"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20876",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20876"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20926",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20926"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20809",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20809"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20816"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20921",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20921"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20931",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20931"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20852",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20852"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20836",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20836"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20851",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20851"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20962",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20962"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20869",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20869"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20862",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20862"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20877",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20877"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20848",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20848"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20965",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20965"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20839",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20839"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20857",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20857"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20919",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20919"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2023-31096",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-31096"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20940",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20940"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20825",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20825"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20823",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20823"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20840",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20840"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20874",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20874"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20934",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20934"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20837",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20837"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20938",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20938"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20833",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20833"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2024-55414",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-55414"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20824",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20824"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20870",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20870"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20937",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20937"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20865",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20865"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20867",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20867"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20873",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20873"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20866",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20866"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20828",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20828"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20832",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20832"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20835",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20835"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20826",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20826"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20864",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20864"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20925",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20925"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20924",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20924"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20847",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20847"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20871",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20871"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20834",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20834"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20861",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20861"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20849",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20849"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20920",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20920"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20830",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20830"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20817",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20817"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20936",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20936"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20860",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20860"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20831",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20831"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20922",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20922"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20819",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20819"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-0386",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0386"
},
{
"published_at": "2026-01-13",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft Windows CVE-2026-20815",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20815"
}
]
}
FKIE_CVE-2024-55414
Vulnerability from fkie_nvd - Published: 2025-01-07 18:15 - Updated: 2025-01-08 16:15| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad en driver SmSerl64.sys en Motorola SM56 Modem WDM Driver v6.12.23.0 que permite a los usuarios con poco nivel de privilegios mapear la memoria f\u00edsica a trav\u00e9s de solicitudes IOCTL especialmente manipuladas. Esto se puede aprovechar para la escalada de privilegios, la ejecuci\u00f3n de c\u00f3digo con privilegios elevados y la divulgaci\u00f3n de informaci\u00f3n. Estos controladores firmados tambi\u00e9n se pueden utilizar para eludir la pol\u00edtica de firma de controladores de Microsoft y as\u00ed implementar c\u00f3digo malicioso."
}
],
"id": "CVE-2024-55414",
"lastModified": "2025-01-08T16:15:35.883",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-01-07T18:15:20.987",
"references": [
{
"source": "cve@mitre.org",
"url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55414/CVE-2024-55414_SmSerl64.sys_README.md"
},
{
"source": "cve@mitre.org",
"url": "https://us.motorola.com/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-6PRQ-Q63R-XQHP
Vulnerability from github – Published: 2025-01-07 18:30 – Updated: 2025-01-08 18:30A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.
{
"affected": [],
"aliases": [
"CVE-2024-55414"
],
"database_specific": {
"cwe_ids": [
"CWE-77"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-07T18:15:20Z",
"severity": "CRITICAL"
},
"details": "A vulnerability exits in driver SmSerl64.sys in Motorola SM56 Modem WDM Driver v6.12.23.0, which allows low-privileged users to mapping physical memory via specially crafted IOCTL requests . This can be exploited for privilege escalation, code execution under high privileges, and information disclosure. These signed drivers can also be used to bypass the Microsoft driver-signing policy to deploy malicious code.",
"id": "GHSA-6prq-q63r-xqhp",
"modified": "2025-01-08T18:30:48Z",
"published": "2025-01-07T18:30:52Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-55414"
},
{
"type": "WEB",
"url": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55414/CVE-2024-55414_SmSerl64.sys_README.md"
},
{
"type": "WEB",
"url": "https://us.motorola.com"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
JVNDB-2026-004359
Vulnerability from jvndb - Published: 2026-02-20 18:35 - Updated:2026-02-20 18:35| Type | URL | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
"dc:date": "2026-02-20T18:35+09:00",
"dcterms:issued": "2026-02-20T18:35+09:00",
"dcterms:modified": "2026-02-20T18:35+09:00",
"description": "CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20804 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability\r\nCVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability\r\nCVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20812 | LDAP Tampering Vulnerability\r\nCVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability\r\nCVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability\r\nCVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability\r\nCVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability\r\nCVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability\r\nCVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability\r\nCVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability\r\nCVE-2026-20834 | Windows Spoofing Vulnerability\r\nCVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20837 | Windows Media Remote Code Execution Vulnerability\r\nCVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability\r\nCVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability\r\nCVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability\r\nCVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability\r\nCVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability\r\nCVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability\r\nCVE-2026-20852 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability\r\nCVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability\r\nCVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability\r\nCVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability\r\nCVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability\r\nCVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability\r\nCVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability\r\nCVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability\r\nCVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability\r\nCVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability\r\nCVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-004359",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2023-31096",
"@id": "CVE-2023-31096",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2024-55414",
"@id": "CVE-2024-55414",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20804",
"@id": "CVE-2026-20804",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20805",
"@id": "CVE-2026-20805",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20809",
"@id": "CVE-2026-20809",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20810",
"@id": "CVE-2026-20810",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20812",
"@id": "CVE-2026-20812",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20814",
"@id": "CVE-2026-20814",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20816",
"@id": "CVE-2026-20816",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20817",
"@id": "CVE-2026-20817",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20820",
"@id": "CVE-2026-20820",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20821",
"@id": "CVE-2026-20821",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20822",
"@id": "CVE-2026-20822",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20823",
"@id": "CVE-2026-20823",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20824",
"@id": "CVE-2026-20824",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20825",
"@id": "CVE-2026-20825",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20826",
"@id": "CVE-2026-20826",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20827",
"@id": "CVE-2026-20827",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20828",
"@id": "CVE-2026-20828",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20829",
"@id": "CVE-2026-20829",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20831",
"@id": "CVE-2026-20831",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20832",
"@id": "CVE-2026-20832",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20834",
"@id": "CVE-2026-20834",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20836",
"@id": "CVE-2026-20836",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20837",
"@id": "CVE-2026-20837",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20839",
"@id": "CVE-2026-20839",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20840",
"@id": "CVE-2026-20840",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20842",
"@id": "CVE-2026-20842",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20843",
"@id": "CVE-2026-20843",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20844",
"@id": "CVE-2026-20844",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20847",
"@id": "CVE-2026-20847",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20848",
"@id": "CVE-2026-20848",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20849",
"@id": "CVE-2026-20849",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20852",
"@id": "CVE-2026-20852",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20853",
"@id": "CVE-2026-20853",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20856",
"@id": "CVE-2026-20856",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20857",
"@id": "CVE-2026-20857",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20858",
"@id": "CVE-2026-20858",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20860",
"@id": "CVE-2026-20860",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20861",
"@id": "CVE-2026-20861",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20862",
"@id": "CVE-2026-20862",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20864",
"@id": "CVE-2026-20864",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20865",
"@id": "CVE-2026-20865",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20866",
"@id": "CVE-2026-20866",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20867",
"@id": "CVE-2026-20867",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20868",
"@id": "CVE-2026-20868",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20869",
"@id": "CVE-2026-20869",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20871",
"@id": "CVE-2026-20871",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20872",
"@id": "CVE-2026-20872",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20873",
"@id": "CVE-2026-20873",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20874",
"@id": "CVE-2026-20874",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20875",
"@id": "CVE-2026-20875",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20877",
"@id": "CVE-2026-20877",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20918",
"@id": "CVE-2026-20918",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20919",
"@id": "CVE-2026-20919",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20921",
"@id": "CVE-2026-20921",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20922",
"@id": "CVE-2026-20922",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20923",
"@id": "CVE-2026-20923",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20924",
"@id": "CVE-2026-20924",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20925",
"@id": "CVE-2026-20925",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20926",
"@id": "CVE-2026-20926",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20927",
"@id": "CVE-2026-20927",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20929",
"@id": "CVE-2026-20929",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20931",
"@id": "CVE-2026-20931",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20932",
"@id": "CVE-2026-20932",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20934",
"@id": "CVE-2026-20934",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20936",
"@id": "CVE-2026-20936",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20937",
"@id": "CVE-2026-20937",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20939",
"@id": "CVE-2026-20939",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20940",
"@id": "CVE-2026-20940",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20962",
"@id": "CVE-2026-20962",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21265",
"@id": "CVE-2026-21265",
"@source": "CVE"
},
{
"#text": "https://msrc.microsoft.com/update-guide/en-us",
"@id": "https://msrc.microsoft.com/update-guide/en-us",
"@source": "Related document"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
CVE-2024-55414
Vulnerability from fstec - Published: 06.01.2025{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "TO2460, TO2461, TO2463, TO2464",
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": "TO2460 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2019 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5073723), TO2461 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows Server 2022 21H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5073457), TO2463 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 11 24H2 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5074109), TO2464 \u041d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Windows 10 1809 \u0434\u043b\u044f x64 \u0441\u0438\u0441\u0442\u0435\u043c (KB5073723)",
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Microsoft Corp, Motorola",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 10.0.26100.32230 (Windows Server 2025), \u0434\u043e 10.0.26100.7623 (Windows 11 24H2), \u0434\u043e 10.0.25398.2092 (Windows Server 2022, 23H2 Edition (Server Core installation)), \u0434\u043e 10.0.22631.6491 (Windows 11 23H2), \u0434\u043e 10.0.26200.7623 (Windows 11 25H2), \u0434\u043e 10.0.26100.32230 (Windows Server 2025 (Server Core installation)), \u0434\u043e 10.0.19045.6809 (Windows 10 22H2), \u0434\u043e 10.0.19044.6809 (Windows 10 21H2), \u0434\u043e 10.0.20348.4648 (Windows Server 2022 (Server Core installation)), \u0434\u043e 10.0.20348.4648 (Windows Server 2022), \u0434\u043e 10.0.17763.8276 (Windows Server 2019 (Server Core installation)), \u0434\u043e 10.0.17763.8276 (Windows Server 2019), \u0434\u043e 10.0.17763.8276 (Windows 10 1809), \u0434\u043e 6.3.9600.22968 (Windows Server 2012 R2 (Server Core installation)), \u0434\u043e 6.3.9600.22968 (Windows Server 2012 R2), \u0434\u043e 6.2.9200.25868 (Windows Server 2012 (Server Core installation)), \u0434\u043e 6.2.9200.25868 (Windows Server 2012), \u0434\u043e 6.1.7601.28117 (Windows Server 2008 R2 Service Pack 1 (Server Core installation)), \u0434\u043e 6.1.7601.28117 (Windows Server 2008 R2 Service Pack 1), \u0434\u043e 6.0.6003.23717 (Windows Server 2008 Service Pack 2 (Server Core Installation)), \u0434\u043e 6.0.6003.23717 (Windows Server 2008 Service Pack 2), \u0434\u043e 10.0.14393.8783 (Windows Server 2016 (Server Core installation)), \u0434\u043e 10.0.14393.8783 (Windows Server 2016), \u0434\u043e 10.0.14393.8783 (Windows 10 1607), 6.12.23.0 (Motorola SM56 Modem WDM Driver)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u0441 \u0446\u0435\u043b\u044c\u044e \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044e \u0438\u0437 \u0434\u0440\u0443\u0433\u0438\u0445 \u043f\u043e\u0434\u0441\u0435\u0442\u0435\u0439;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-55414",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "06.01.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "28.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.01.2026",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2026-00910",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-55414",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Windows Server 2025, Windows 11 24H2, Windows Server 2022, 23H2 Edition (Server Core installation), Windows 11 23H2, Windows 11 25H2, Windows Server 2025 (Server Core installation), Windows 10 22H2, Windows 10 21H2, Windows Server 2022 (Server Core installation), Windows Server 2022, Windows Server 2019 (Server Core installation), Windows Server 2019, Windows 10 1809, Windows Server 2012 R2 (Server Core installation), Windows Server 2012 R2, Windows Server 2012 (Server Core installation), Windows Server 2012, Windows Server 2008 R2 Service Pack 1 (Server Core installation), Windows Server 2008 R2 Service Pack 1, Windows Server 2008 Service Pack 2 (Server Core Installation), Windows Server 2008 Service Pack 2, Windows Server 2016 (Server Core installation), Windows Server 2016, Windows 10 1607, Motorola SM56 Modem WDM Driver",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Microsoft Corp Windows Server 2025 \u0434\u043e 10.0.26100.32230 , Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7623 64-bit, Microsoft Corp Windows 11 24H2 \u0434\u043e 10.0.26100.7623 ARM64, Microsoft Corp Windows Server 2022, 23H2 Edition (Server Core installation) \u0434\u043e 10.0.25398.2092 , Microsoft Corp Windows 11 23H2 \u0434\u043e 10.0.22631.6491 64-bit, Microsoft Corp Windows 11 23H2 \u0434\u043e 10.0.22631.6491 ARM64, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26200.7623 64-bit, Microsoft Corp Windows 11 25H2 \u0434\u043e 10.0.26200.7623 ARM64, Microsoft Corp Windows Server 2025 (Server Core installation) \u0434\u043e 10.0.26100.32230 , Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6809 32-bit, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6809 ARM64, Microsoft Corp Windows 10 22H2 \u0434\u043e 10.0.19045.6809 64-bit, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6809 64-bit, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6809 ARM64, Microsoft Corp Windows 10 21H2 \u0434\u043e 10.0.19044.6809 32-bit, Microsoft Corp Windows Server 2022 (Server Core installation) \u0434\u043e 10.0.20348.4648 , Microsoft Corp Windows Server 2022 \u0434\u043e 10.0.20348.4648 , Microsoft Corp Windows Server 2019 (Server Core installation) \u0434\u043e 10.0.17763.8276 , Microsoft Corp Windows Server 2019 \u0434\u043e 10.0.17763.8276 , Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.8276 64-bit, Microsoft Corp Windows 10 1809 \u0434\u043e 10.0.17763.8276 32-bit, Microsoft Corp Windows Server 2012 R2 (Server Core installation) \u0434\u043e 6.3.9600.22968 , Microsoft Corp Windows Server 2012 R2 \u0434\u043e 6.3.9600.22968 , Microsoft Corp Windows Server 2012 (Server Core installation) \u0434\u043e 6.2.9200.25868 , Microsoft Corp Windows Server 2012 \u0434\u043e 6.2.9200.25868 , Microsoft Corp Windows Server 2008 R2 Service Pack 1 (Server Core installation) \u0434\u043e 6.1.7601.28117 64-bit, Microsoft Corp Windows Server 2008 R2 Service Pack 1 \u0434\u043e 6.1.7601.28117 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 (Server Core Installation) \u0434\u043e 6.0.6003.23717 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 (Server Core Installation) \u0434\u043e 6.0.6003.23717 32-bit, Microsoft Corp Windows Server 2008 Service Pack 2 \u0434\u043e 6.0.6003.23717 64-bit, Microsoft Corp Windows Server 2008 Service Pack 2 \u0434\u043e 6.0.6003.23717 32-bit, Microsoft Corp Windows Server 2016 (Server Core installation) \u0434\u043e 10.0.14393.8783 , Microsoft Corp Windows Server 2016 \u0434\u043e 10.0.14393.8783 , Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8783 64-bit, Microsoft Corp Windows 10 1607 \u0434\u043e 10.0.14393.8783 32-bit",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043c\u043e\u0434\u0435\u043c\u0430 Motorola SM56 Modem WDM Driver (SmSerl64.sys) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u0431\u043e\u0439\u0442\u0438 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u043b\u0435\u0433\u0438\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u0435 \u043c\u0435\u0440 \u043f\u043e \u0447\u0438\u0441\u0442\u043a\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u043c \u0443\u0440\u043e\u0432\u043d\u0435 (\u0412\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0432 \u043a\u043e\u043c\u0430\u043d\u0434\u0443) (CWE-77), \u041f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0434\u0438\u043d\u0430\u043c\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u0430\u043c\u044f\u0442\u0438 (CWE-122)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043c\u043e\u0434\u0435\u043c\u0430 Motorola SM56 Modem WDM Driver (SmSerl64.sys) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043e\u0431\u043e\u0439\u0442\u0438 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f SYSTEM, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0445 IOCTL-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f, \u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/heyheysky/vulnerable-driver/blob/master/CVE-2024-55414/CVE-2024-55414_SmSerl64.sys_README.md\nhttps://us.motorola.com/\nhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-55414\nhttps://threats.kaspersky.com/en/vulnerability/KLA90838/\nhttps://vuldb.com/?id.290682",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-77, CWE-122",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.