CVE-2024-43451
Published Nov 12, 2024
Last updated 5 months ago
- Description
- NTLM Hash Disclosure Spoofing Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Modified
- Products
- windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_22h2, windows_11_23h2, windows_11_24h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025
CVSS 3.1
- Type
- Secondary
- Base score
- 6.5
- Impact score
- 3.6
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
- Severity
- MEDIUM
Data from CISA
- Vulnerability name
- Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability
- Exploit added on
- Nov 12, 2024
- Exploit action due
- Dec 3, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- secure@microsoft.com
- CWE-73
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
📢 𝐍𝐞𝐰 𝐂𝐕𝐄 𝐚𝐧𝐚𝐥𝐲𝐬𝐢𝐬 𝐣𝐮𝐬𝐭 𝐝𝐫𝐨𝐩𝐩𝐞𝐝! CERT-UA uncovers UAC-0050’s mass phishing using CVE-2024-43451. Learn how the group deploys RemcosRAT and how to defend with real-time intelligence. 📖 Check the de
@PurpleOps_io
3 Feb 2026
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
German manufacturing faces rising phishing attacks exploiting CVE-2024-43451 via invoice-themed lures delivering AsyncRAT and XWorm through WebDAV shortcuts. Targeted threat hunting reveals new samples and infrastructure. #AsyncRAT #Germany https://t.co/o4dKu8XHky
@TweetThreatNews
17 Jan 2026
91 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
German manufacturing faces rising phishing attacks exploiting CVE-2024-43451, using invoice lures and WebDAV-delivered AsyncRAT payloads. Early detection through sandbox analysis limits downtime. #AsyncRAT #Germany #InvoicePhishing https://t.co/BHaWVkH0qg
@TweetThreatNews
17 Jan 2026
97 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#VulnerabilityReport #BlindEagle Zombie Protocol: How NTLM Flaws Like CVE-2024-43451 Are Haunting 2025 https://t.co/Q40bGUZzeN
@Komodosec
3 Jan 2026
88 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Zombie Protocol: How NTLM Flaws Like CVE-2024-43451 Are Haunting 2025 https://t.co/IVGdrxuVHm
@CrowdCyber_Com
28 Nov 2025
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 DARK BAY CYBER REPORT 1/7 **CISA KEV DROP → CVE-2024-43451 Microsoft Windows NTLMv2 Hash Disclosure Spoofing** Active exploitation in US healthcare and finance since Nov 12.
@DarkBayIntel
24 Nov 2025
1 Impression
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Blind Eagle (APT-C-36) has targeted Colombian gov, finance, & critical sectors since 2018, using sophisticated phishing & malware. Recent campaigns exploited CVE-2024-43451 via malicious URLs & WebDAV for stealthy exfiltration. 🔍 #Colombia #ThreatIntel https://t.co
@TweetThreatNews
2 Jul 2025
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Darktrace detects Blind Eagle (APT-C-36), targeting Colombian gov, finance, and infrastructure sectors since 2018. Despite patches for CVE-2024-43451, they exploit WebDAV & DNS to deliver malware & exfiltrate data. 🛡️ #Colombia #WebDAV #Malware https://t.co/vrnqj7roD
@TweetThreatNews
25 Jun 2025
63 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-43451 and CVE-2024-49039
@transilienceai
6 Jun 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-24054 e lo sfruttamento attivo di NTLM: vulnerabilità silenziose in Windows Sicurezza Informatica, .library-ms, attack 2025, CVE-2024-43451, CVE-2025-24054, disclosure, NTLM, NTLMv2, pass-the-hash, path vulnerability, PHISHING, SMB relay, spoofi… https://t.co/zgdhKuYCol
@matricedigitale
18 Apr 2025
61 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
NTLMハッシュ漏洩の脆弱性CVE-2025-24054が実際に悪用されている。Check Point社報告。脆弱性は3月の定期更新で修正されたもの。悪用活動を"NTLM Exploits Bomb"と命名。 https://t.co/wr3lXygpZt ポーランドとルーマニアの官民組織が標的で、ロシアのAPT集団UAC-0194が悪用していたCVE-2024-43451
@__kokumoto
16 Apr 2025
1214 Impressions
3 Retweets
11 Likes
5 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-43451
@transilienceai
21 Mar 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-43451
@transilienceai
17 Mar 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
脅威主体Blind Eagle/APT-C-36が、南米で1,600のマルウェア被害者を発生させている。Check Point社報告。マイクロソフトが2024年12月にCVE-2024-43451の修正を公表した凡そ6日後にはこれを悪用。 https://t.co/kbhfJx1KV1
@__kokumoto
12 Mar 2025
1341 Impressions
1 Retweet
8 Likes
1 Bookmark
0 Replies
0 Quotes
Blind Eagle intensifica gli attacchi: campagne mirate contro istituzioni colombiane Sicurezza Informatica, apt, APT-C-36, Blind Eagle, colombia, CVE-2024-43451, exploit, guerra cibernetica, malware, PHISHING, rat, Remcos, WebDAV https://t.co/XuUmYoqmFk https://t.co/0D1T5IyzcN
@matricedigitale
12 Mar 2025
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Blind Eagle strikes again—over 1,600 victims in Colombia since Nov 2024! 🇨🇴 Government & private orgs targeted using spear-phishing & new malware like Remcos RAT. CVE-2024-43451 exploit hits 6 days after patch. See it: https://t.co/fjAnOqxpGF
@TheHackersNews
12 Mar 2025
10869 Impressions
30 Retweets
66 Likes
7 Bookmarks
1 Reply
0 Quotes
🚨 Blind Eagle APT is targeting Colombian institutions with .url malware mimicking CVE-2024-43451 behavior! Over 1,600 victims in one campaign alone. Operation Fail also exposed past phishing activities, stealing 8K+ PII. #CyberSecurity #APT #BlindEagle https://t.co/Q3YsXhCfFX
@MDST9999
11 Mar 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Blind Eagle APT is targeting Colombian institutions with .url malware mimicking CVE-2024-43451 behavior! Over 1,600 victims in one campaign alone. Operation Fail also exposed past phishing activities, stealing 8K+ PII. #CyberSecurity #APT #BlindEagle https://t.co/UxUhh5tMUC
@HRalphBonnell
10 Mar 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Check Point Research reveals Blind Eagle (APT-C-36) has targeted Colombian government and private sectors since late 2024, exploiting CVE-2024-43451. Over 1,600 infections reported. 🇨🇴 #BlindEagle #CyberAttack #Colombia link: https://t.co/sNw3rOiyn7 https://t.co/1GBVtMXMsg
@TweetThreatNews
10 Mar 2025
108 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Blind Eagle APT is targeting Colombian institutions with .url malware mimicking CVE-2024-43451 behavior! Over 1,600 victims in one campaign alone. Operation Fail also exposed past phishing activities, stealing 8K+ PII. #CyberSecurity #APT #BlindEagle https://t.co/A4PZYJTbyn
@mdfaridulalam
10 Mar 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Blind Eagle APT is targeting Colombian institutions with .url malware mimicking CVE-2024-43451 behavior! Over 1,600 victims in one campaign alone. Operation Fail also exposed past phishing activities, stealing 8K+ PII. #CyberSecurity #APT #BlindEagle https://t.co/K0uXqYC1Me
@_CPResearch_
10 Mar 2025
3285 Impressions
12 Retweets
28 Likes
7 Bookmarks
0 Replies
0 Quotes
Micropatches Released for NTLM Hash Disclosure Spoofing Vulnerability (CVE-2024-43451) https://t.co/oThem9ivXz
@TMJIntel
4 Feb 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit 1. CVE-2024-43451: Windows NTLMv2 0-day https://t.co/TgQztpU3HB 2. CVE-2024-50050: Vulnerability in meta-llama/llama-stack https://t.co/X1INA4cuA3
@ksg93rd
24 Jan 2025
213 Impressions
0 Retweets
5 Likes
2 Bookmarks
0 Replies
0 Quotes
#exploit 1. CVE-2024-43451: Windows NTLMv2 0-day https://t.co/sTsJBKmCqh 2. CVE-2024-50050: Vulnerability in meta-llama/llama-stack https://t.co/F3EHLdhuUv
@akaclandestine
24 Jan 2025
1570 Impressions
14 Retweets
34 Likes
12 Bookmarks
0 Replies
0 Quotes
🚨 Detection Script for Microsoft Windows NTLM Hash Disclosure Spoofing Vulnerability🚨 📛 CVE-2024-43451 🟠 CVSS: 6.5 ⚠️ CWE: CWE-73 - External Control of File Name or Path 📈 Impact: Code Execution 🎯 CISA KEV: ✅ 🛠️ TTPs: T1190 - Exploit Public-Facing Application 🔗 PoC:… htt
@gothburz
31 Dec 2024
147 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical Alert: CVE-2024-43451 A vulnerability in Microsoft Windows enables attackers to extract NTLMv2 hashes with minimal interaction. This opens the door to pass-the-hash attacks, granting unauthorized access to sensitive resources. 🛡️ Detection Guide: https://t.co/z3n4NDiG6N
@IbraheemA50
17 Dec 2024
123 Impressions
1 Retweet
1 Like
0 Bookmarks
1 Reply
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-35286 2 - CVE-2024-3400 3 - CVE-2024-40834 4 - CVE-2024-43451 5 - CVE-2024-8636 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
7 Dec 2024
80 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Great blog by @dekel_paz about mitigating CVE-2024-43451 (and many other 0-days for that matter) by outbound restriction in the @ZeroNetworks platform. https://t.co/lQj9furdUh
@ZeroNLabs
5 Dec 2024
46 Impressions
2 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🟠 #Windows NTLMv2 Hash Disclosure Spoofing Vulnerability (#CVE-2024-43451) - MEDIUM - Medium https://t.co/t9HFfdbNVn
@dailycve
28 Nov 2024
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Windows ゼロデイ脆弱性 CVE-2024-43451 を悪用:1回の右クリックで C2 通信を確立 https://t.co/217oLUA7N5 #CISA #ClearSky #CyberAttack #Exploit #Government #IOC #KEV #Malware #Microsoft #NTLM #Phishing #RedLine #Scammer #SparkRAT #UAC0194 #Ukraine #Vulnerability #ZeroDay
@iototsecnews
25 Nov 2024
195 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
November 2024 Microsoft Patch Tuesday Summary 4 zero-day vulnerabilities addressed: Two of which with CVE-2024-49039 and CVE-2024-43451 exploited in the wild. #PatchNOW #cybersecurity #Windows #ComputerSecurity #hacked #Cyberattack #infosec #informationsecurity #DataBreach htt
@haker_teach
23 Nov 2024
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-43451
@transilienceai
23 Nov 2024
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
A newly patched Windows NT LAN Manager (NTLM) vulnerability, CVE-2024-43451, was exploited as a zero-day by a suspected Russia-linked actor targeting Ukraine. The flaw, which enables theft of NTLMv2 hashes through minimal user interaction, was used in phishing attacks… https://t.
@enfoasecurity
22 Nov 2024
181 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A newly patched Windows NT LAN Manager (NTLM) vulnerability, CVE-2024-43451, was exploited as a zero-day by a suspected Russia-linked actor in cyberattacks targeting Ukraine. https://t.co/5zbbirj6zM
@smart_c_intel
22 Nov 2024
60 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Microsoft’s November 2024 Patch Tuesday Addresses 87 CVEs (CVE-2024-43451, CVE-2024-49039) https://t.co/KtgRSaHTBo https://t.co/rbZI1xAFug
@NickBla41002745
20 Nov 2024
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-43451
@transilienceai
20 Nov 2024
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-43451 is getting exploited #inthewild. Find out more at https://t.co/5gGiG0xS5z CVE-2021-26086 is getting exploited #inthewild. Find out more at https://t.co/j2SoRuRnAx CVE-2024-43451 is getting exploited #inthewild. Find out more at https://t.co/5gGiG0xS5z
@inthewildio
19 Nov 2024
67 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#CyberSecurityUpdate: Microsoft ha rilasciato aggiornamenti critici correggendo 89 vulnerabilità, mettendo in luce CVE-2024-43451, già sfruttata attivamente dagli hacker. Questo difetto nel motore MSHTML, nonostante la non elevata severità, permette attacchi minimamente… https://
@cyber_net_now
18 Nov 2024
5 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🍁У Microsoft прошёл ноябрьский Patch Tuesday. А значит, настало время срочно обновить Windows. Компания закрыла уязвимость нулевого дня CVE-2024-43451 🕷 и 88 других «дыр». Об этом и о том, ак укрепить защиту рабочих устройств — в нашем новом посте: https://t.co/2CxVvqe4zq http
@Kaspersky_ru
18 Nov 2024
178 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
تازگی آسیب پذیری جدیدی از نوع Zero day برای ویندوز با کد شناسایی CVE-2024-43451 منتشر شده است. این آسیب پذیری بر روی تمامی نسخه های ویندوز شامل ویندوز ۷ و ویندوز ۸ و ویندوز ۱۰ و حتی ویندوز ۱۱ قابل اکسپلویت شدن می باشد. https://t.co/Poz3aKYxT1 https://t.co/eIlwq47HXh
@AmirHossein_sec
17 Nov 2024
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-23113 2 - CVE-2024-7965 3 - CVE-2024-47575 4 - CVE-2024-43451 5 - CVE-2024-5690 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
17 Nov 2024
185 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
تنبيه بشأن استغلال الثغرة: استغلت جهات التهديد المرتبطة بروسيا الثغرة الأمنية CVE-2024-43451 بشكل نشط لنشر Spark RAT، مع إمكانية حدوث أضرار جسيمة من خلال سرقة بيانات الاعتماد. اقرأ: https://t.co/hWTabfh2C4
@CERT_Arabic
17 Nov 2024
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Patch Now! Critical #Windows Flaw (#CVE-2024-43451) Actively Exploited https://t.co/14pK4djOQR
@UndercodeNews
16 Nov 2024
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 ¡Actualiza tus sistemas ahora! La vulnerabilidad CVE-2024-43451 en Windows, explotada activamente por meses, ha sido corregida en noviembre.📩 Atacantes utilizaron correos de spear-phishing y el malware SparkRAT para comprometer sistemas. 🔒🛡️ #Ciberseguridad #Malware #ZeroDa
@RedExpertos
15 Nov 2024
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Russian hackers exploited CVE-2024-43451, a new NTLM flaw, in attacks on Ukraine, using phishing emails to deploy malware. Microsoft patched it, but ensure systems are updated by Dec 3 to avoid "pass-the-hash" risks, as flagged by CISA. Stay vigilant!
@xyberpwn
15 Nov 2024
53 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft tackled 83 vulnerabilities this month. Among the critical ones, NTLM Hash Disclosure (CVE-2024-43451) is at large, risking user confidentiality with easy exploitation. Patch and monitor diligently to be secure. Sign up for our threat advisory! https://t.co/5cS5XkWqLH h
@sequretek_sqtk
15 Nov 2024
24 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
⚠️ Find files related to the new zero-day vulnerability – #ExploreWithANYRUN ✅ We’ve added the detection for CVE-2024-43451, allowing our users to track and analyze this threat 📌 #CVE can be detected by inspecting the URL shortcut and checking for SMB connections 📂 The… ht
@anyrun_app
15 Nov 2024
1423 Impressions
6 Retweets
16 Likes
4 Bookmarks
0 Replies
0 Quotes
New NTLM Zero-Day Exploit Alert! Microsoft patches CVE-2024-43451, actively exploited by a suspected Russia-linked actor targeting Ukraine. Attack chain delivers Spark RAT via phishing & malicious .URL files. #CyberSecurity #ZeroDay #Hacking #BugBounty #news #NTLM #PatchN
@safeyourweb
15 Nov 2024
86 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#0day CVE-2024-43451 https://t.co/3HUw5cKZyu
@42mayfly
15 Nov 2024
91 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Windows Zero-Day Exploited by Russia Triggered With File Drag-and-Drop, Delete Actions 🚨 WIRE TOR - The Ethical Hacking Services ⚠️ Hackers have found a way to exploit a newly patched zero-day vulnerability in Windows identified as CVE-2024-43451. #cve https://t.co/r2mmfO6nv
@WireTor
14 Nov 2024
56 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "94D57126-EC8D-4898-A5FE-D7EB6463B634",
"versionEndExcluding": "10.0.10240.20826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "54AA8A1F-0EAD-406A-A4AF-B86C316D1089",
"versionEndExcluding": "10.0.10240.20826",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "86F8F1B2-C206-4CD6-83C6-C450329CEE10",
"versionEndExcluding": "10.0.14393.7515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "FCBE6103-075E-4841-836D-4E0D630E99FF",
"versionEndExcluding": "10.0.14393.7515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "81C732A1-CC0F-4633-B00D-473869E77DB9",
"versionEndExcluding": "10.0.17763.6532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "AF9C20B8-CB5E-46C9-B041-D6A42C26703B",
"versionEndExcluding": "10.0.17763.6532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "71AD0B79-C3EF-4E13-AB04-D5FAEABA6954",
"versionEndExcluding": "10.0.19044.5131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "B35413A3-DE3B-4E35-AB48-C6D5D138AC07",
"versionEndExcluding": "10.0.19044.5131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "D0558F5F-A561-41E9-9242-7F4A5D924479",
"versionEndExcluding": "10.0.19044.5131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "EA243DE7-EDB1-43DA-AD7E-541843DECB58",
"versionEndExcluding": "10.0.19045.5131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "5D428E06-FC7C-4151-9582-D66D05D7AFE6",
"versionEndExcluding": "10.0.19045.5131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "FB49C811-F4D7-46EB-9ED6-50CB3EAAAD90",
"versionEndExcluding": "10.0.19045.5131",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "04BC0915-6F14-4D7A-951F-83CBAB47C3C4",
"versionEndExcluding": "10.0.22621.4460",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "8A16CFCB-D002-4F63-B568-9D14ACE88E94",
"versionEndExcluding": "10.0.22621.4460",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "B8FE14E5-7226-43CA-A57E-A81636185AD4",
"versionEndExcluding": "10.0.22631.4460",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "97507261-3969-4EBF-BCED-93FBADCBB6DC",
"versionEndExcluding": "10.0.22631.4460",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"matchCriteriaId": "D32C04CA-E5BE-47CA-AF79-B39859288531",
"versionEndExcluding": "10.0.26100.2314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "40A6B92E-21C6-4BDD-BA57-DC227FF0F998",
"versionEndExcluding": "10.0.26100.2314",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82E3AC46-9D0D-4381-93EE-FE87C212040A",
"versionEndExcluding": "10.0.14393.7515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A43E1F6C-B2A7-4DEC-B4EC-04153746C42B",
"versionEndExcluding": "10.0.17763.6532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38D9CE84-B85F-42B0-959D-A390427A1641",
"versionEndExcluding": "10.0.20348.2849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A549BD98-3DE2-4EF3-A579-12AFCB764975",
"versionEndExcluding": "10.0.25398.1251",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F17FD7F-254D-4EE6-9D22-468E76D9B054",
"versionEndExcluding": "10.0.26100.2314",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]