- Description
- Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Analyzed
- Products
- windows_10_1507, windows_10_1607, windows_10_1809, windows_10_21h2, windows_10_22h2, windows_11_22h2, windows_11_24h2, windows_server_2008, windows_server_2012, windows_server_2016, windows_server_2019, windows_server_2022, windows_server_2022_23h2, windows_server_2025
CVSS 3.1
- Type
- Secondary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
- secure@microsoft.com
- CWE-190
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
𝗕𝗲𝘀𝘁 𝗼𝗳 𝟮𝟬𝟮𝟱: The release of LDAPNightmare turned a critical Windows LDAP flaw into a concrete enterprise risk. SafeBreach Labs published the first proof of concept exploit for CVE-2024-49112, showing how unpatched Windows Servers and Active Directo
@securityblvd
5 Jan 2026
87 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Baiting security buffs with fake PoC exploits? Old trick—still works. Is your April-fool-free toolkit ready, @TechGuru? Put it to the test against CVE-2024-49112. It’s a mad world out there. Stay safe, not sorry. #CyberSecurity #MicrosoftPatch #InfoSec https://t.co/am57uSuSc
@LimitedViewX
18 May 2025
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Morning, Cyber Superheroes! Just so you know, LDAP’s still stirring up trouble. CVE-2024-49112 or CVE-2024-49113 ring a bell, huh? Fancy a ‘patch’ of honour for fixing it? Check out @Microsoft’s latest. By the way, did you reboot yet? #PatchTuesday #LDAPNightmare #CyberSe
@LimitedViewX
8 May 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49112 と CVE-2024-49113 – LDAPNightmareの脆弱性 Windows LDAPに影響を及ぼす重大なRCEおよびDoSエクスプロイト!パッチ適用のアドバイスや重要なセキュリティ対策については、Cato CTRLのブログをご覧ください。https://t.co/ABwmaREKZl #CatoCTRL https://t.co/ylGsfyAdZj
@CatoNetworksJP
27 Mar 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2024-49112
@transilienceai
10 Mar 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2024-49112
@transilienceai
4 Mar 2025
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🧵 Fio: 1/ ❓ Como os atacantes podem explorar os CVE-2024-49112 e CVE-2024-49113? Essas vulnerabilidades podem ser usadas para comprometer seu sistema. https://t.co/LS6Bei0cmR
@TrendMicroBR
17 Feb 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-49112 is under scrutiny after a typographical error mislabeling it as CVE-2024-49113 enabled a spoof GitHub repository. Beware of potential malware data collection & FTP risks! 🔒🐱💻 #GitHubSecurity #MalwareAlert #USA link: https://t.co/weGhHKgEYB https://t.co/Sd2
@TweetThreatNews
17 Feb 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🧵 Hilo: 1/ ❓ ¿Cómo pueden los atacantes explotar CVE-2024-49112 y CVE-2024-49113? Estas vulnerabilidades podrían ser utilizadas para comprometer tu sistema https://t.co/QmfekMQjlc
@TrendMicroLATAM
17 Feb 2025
21 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🔒 Windows Zero-Click Vulnerability (CVE-2024-49112) PoC exploit released—patch now to stay protected! Details: https://t.co/ZJFC8guGcw #Cybersecurity #CVE2024 #InfoSec
@Sajin92487373
16 Jan 2025
19 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
به تازگی آسیب پذیری جدیدی برای سرویس LDAP با کدهای شناسایی CVE-2024-49112 و CVE-2024-49113 منتشر شد. اکسپلویت این آسیب پذیری با نام LDAPNightmare در GitHub به عنوان poc و برای شناسایی این آسیب پذیری توسط کاربران این سرویس ، بارگزاری شد. https://t.co/Poz3aKYxT1 https://t.co/i2Oo
@AmirHossein_sec
14 Jan 2025
35 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49112 has a CVSS rating of 9.8 ☠️ this is sugar for ransomware https://t.co/ialKfb7Yvi
@cyber_scrutiny
14 Jan 2025
85 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-49112 ❤️🔥 Integer Overflow Vulnerability in Windows LDAP Service Leading to Unauthenticated RCE ✌🏻
@7h3h4ckv157
14 Jan 2025
2732 Impressions
8 Retweets
73 Likes
8 Bookmarks
1 Reply
0 Quotes
On 12/10, Microsoft published CVE-2024-49112 & CVE-2024-49113—two LDAP vulnerabilities that affect Windows Active Directory Domain Controllers. They’ve received significant attention due to their severity and the lack of any public documentation explaining the exploitation pa
@safebreach
14 Jan 2025
70 Impressions
0 Retweets
1 Like
0 Bookmarks
1 Reply
0 Quotes
Threat Alert: Fake LDAPNightmare exploit on GitHub spreads infostealer malware CVE-2024-49112 CVE-2024-49113 CVE-2024-49138 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/ifVGosLGvd #CyberSecurity #ThreatIntel #InfoSec (1/3)
@fletch_ai
14 Jan 2025
74 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-49112 & 49113っていうAD(LDAP)脆弱性対応を 今日明日やらんといけなさそうで、準備しとった CVE-2024-26248の対応もあるから面倒で・・・ あれ?今日って祝日? めっさ仕事する気でいた月曜午前 のんきな旅行レポ読んでうっすら自覚した
@saxmid
13 Jan 2025
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
LDAP Nightmare(CVE-2024-49112) 취약점 https://t.co/uRnv8Z9zCr
@Moonding1
12 Jan 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Security pros baited with fake Windows LDAP exploit traps: https://t.co/dAwpIUzuOm Security researchers are being targeted with fake exploits for Microsoft vulnerabilities, specifically CVE-2024-49113 (LDAPNightmare) and CVE-2024-49112, both patched in December 2024. A… https://
@securityRSS
10 Jan 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚩 #ciberseguridad #hacking Exploit DoS para LDAPNightmare (CVE-2024-49112) 🔒 https://t.co/cJC4WekEj5 https://t.co/1rjR8OgqcN
@mileseceirl
9 Jan 2025
43 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Heads up, #CyberSecurity pros! Two critical LDAP vulnerabilities, CVE-2024-49112 (RCE-9.8) & CVE-2024-49113 (DoS-7.5), threaten Windows servers. Patch ASAP to stay secure! More info: https://t.co/ZrJzzemF6C #PatchTuesday #Infosec
@ThreatVector24
7 Jan 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical Remote Code Execution (RCE) vulnerability has been identified in the Windows Lightweight Directory Access Protocol (LDAP), designated as CVE-2024-49112, with a CVSS score of 9.8 POC here https://t.co/5NtHITwxrt
@intsecllc
6 Jan 2025
44 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
آسیب پذیری با کد شناسایی CVE-2024-49112 برای Windows LDAP از نوع Buffer Ovwrflow منتشر شده است. هکرها با ارسال یک درخواست دستکاری شده LDAP به سمت DC آسیب پذیر ، به دلیل وجود ضعف memory Corruption در سرویس ldap سرویس DC دچار Crash می شود. https://t.co/Poz3aKYxT1 https://t.co/2R21h
@AmirHossein_sec
5 Jan 2025
50 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-43405 2 - CVE-2023-45866 3 - CVE-2024-49112 4 - CVE-2024-49113 5 - CVE-2024-4367 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
5 Jan 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
What We Know About CVE-2024-49112 and CVE-2024-49113 https://t.co/87OzMjqTmM
@WhalersLtd
4 Jan 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Alert: Critical Windows LDAP flaw could lead to crashed servers, RCE attacks CVE-2024-49112 CVE-2024-49113 CVE-2024-49138 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/ifVGosLGvd #CyberSecurity #ThreatIntel #InfoSec
@fletch_ai
4 Jan 2025
38 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 IT Service Providers: Critical Windows LDAP vulnerabilities (CVE-2024-49112 & CVE-2024-49113) disclosed! Use our new metric to identify & update affected systems quickly. 📍 Admin > Metric > Windows Stay secure—together, we’ve got this! 💪 #CyberSecurit
@LiongardHQ
3 Jan 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
LDAPNightmare: SafeBreach Labs Publishes First Proof-of-Concept Exploit for CVE-2024-49112 https://t.co/Iw71ZXLdhY
@samilaiho
3 Jan 2025
1189 Impressions
7 Retweets
8 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 LDAPNightmare PoC Exploit: CVE-2024-49113 🚨 A new PoC exploit crashes Windows Domain Controllers by targeting LSASS via CLDAP responses, causing a DoS and forced reboot. Exploit also risks RCE (CVE-2024-49112). 🛠️ Mitigation Tips: Apply December 2024 Microsoft patches… ht
@arunpratap786
3 Jan 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49112 : PoC Exploit Tool released for critical window LDAP Zero-click RCE vulnerability #LDAPNightmare https://t.co/7fjpTIzYVm
@freedomhack101
3 Jan 2025
59 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
تم نشر استغلال PoC لثغرة CVE-2024-49113 و ثغرة CVE-2024-49112 الاولى منها تسبب هجمات حجب الخدمة DOS، والأخرى تسبب التحكم والسيطرة عن بعد، الثغرة تم تحديثها الشهر الماضي، والتحديث الان اصبح اكثر أهمية https://t.co/UKj8t1A3kS #الامن_السيبراني https://t.co/q1Hqadwb13
@MAlajab
3 Jan 2025
981 Impressions
1 Retweet
13 Likes
7 Bookmarks
0 Replies
0 Quotes
SafeBreach released a writeup on Jan 1st linking CVE-2024-49112 to a DoS exploit. However, the original researcher who reported the bug to Microsoft disagrees. Find out more: https://t.co/GllDI3OPM7 #CyberSecurity #CVE202449112 #InfoSec #Microsoft
@intruder_io
3 Jan 2025
71 Impressions
2 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Upozorňujeme na aktivní zneužívání závažných zranitelností v protokolu Windows Lightweight Directory Access Protocol (LDAP) známé pod označením CVE-2024-49112 CVE-2024-49113. Vzdálenému autentizovanému útočníkovi je umožněno vykonávat vzdáleně kód a způsobit výpadek LSASS…
@GOVCERT_CZ
3 Jan 2025
1140 Impressions
2 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Upozorňujeme na aktivní zneužívání závažných zranitelností v protokolu Windows Lightweight Directory Access Protocol (LDAP) známé pod označením CVE-2024-49112 CVE-2024-49113. Vzdálenému autentizovanému útočníkovi je umožněno vykonávat vzdáleně kód a způsobit výpadek LSASS…
@GOVCERT_CZ
3 Jan 2025
236 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49112 will soon be weaponized, DC's will fall left and right, Patch now! https://t.co/GogObKecsg Credit: https://t.co/DGG2NivPds https://t.co/zFQYxAJQhn
@zertux6
3 Jan 2025
191 Impressions
0 Retweets
3 Likes
0 Bookmarks
1 Reply
0 Quotes
Investigadores de SafeBreach han publicado el código de una prueba de concepto (PoC) que se aprovecha de la #vulnerabilidad CVE-2024-49112 (CVSSv3 9.8), conocida como #LDAPNightmare https://t.co/UJ0Es6Rpvr https://t.co/3pzkkJ4nPj
@AlexMilla_
3 Jan 2025
93 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Here is the ironic side of vuln response based on CVSS score - especially when it comes to binary vulns. Everyone cares about CVE-2024-49112 because MS assigns CVSS 9.8 to this vulneraiblity, but never forget the score is highly affected by the skills of the analysis team behind
@guhe120
3 Jan 2025
10549 Impressions
3 Retweets
39 Likes
2 Bookmarks
2 Replies
2 Quotes
Zero-Click Zafiyeti CVE-2024-49112: Windows Sistemlerinde Kritik RCE Açığı PoC Exploit Yayımlandı https://t.co/Ng3P8lFSw6
@cyberwebeyeos
3 Jan 2025
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
2025-01-02 の人気記事はコチラでした。(自動ツイート) #Hacker_Trends ――― PoC Exploit Released for Zero-Click Vulnerability CVE-2024-49112 in Windows https://t.co/TGCyyGvsLm https://t.co/Ln9dgu3sdh
@motikan2010
3 Jan 2025
207 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#Windows: PoC Exploit Released for Zero-Click Critical #Vulnerability CVE-2024-49112 in Windows (dubbed "LDAP Nightmare"). This vulnerability affects all unpatched versions of Windows Server, from Windows Server 2019 to 2022: 👇 https://t.co/lHCwUY3bcP
@securestep9
2 Jan 2025
963 Impressions
5 Retweets
11 Likes
3 Bookmarks
0 Replies
0 Quotes
First PoC Exploit of 2025 CVE-2024-49112 CVSS Score 9.8 (“LDAP Nightmare”) Mitigation Steps: 1️⃣ Apply the patch immediately: Microsoft’s December 2024 Patch Tuesday addresses this flaw. 2️⃣ Monitor networks: Watch for anomalous LDAP traffic, DNS SRV queries, and CLDAP responses.
@BattalFaikAktas
2 Jan 2025
196 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
1 Quote
Exploit DoS para LDAP Nightmare (CVE-2024-49112) Vulnerabilidad crítica en el cliente LDAP de Windows que según Microsoft permite la ejecución remota de código https://t.co/o9GDBxuDt2
@elhackernet
2 Jan 2025
4977 Impressions
33 Retweets
115 Likes
25 Bookmarks
0 Replies
0 Quotes
LDAPNightmare : First Proof-of-Concept Exploit for CVE-2024-49112 : https://t.co/Apfh6B6Wz4 credits @oryair1999 @ShahakMo LdapNightmare : a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112 : https://t.co/vfZ3Yxu3Z8 https://t.co/OVnFQgm7wZ
@binitamshah
2 Jan 2025
16752 Impressions
72 Retweets
303 Likes
171 Bookmarks
1 Reply
0 Quotes
WindowsのLDAPNightmare脆弱性(CVE-2024-49112)に対応するゼロクリックPoC(攻撃の概念実証コード)をSafeBreach社が公表。CVE-2024-49112はCVSSスコア9.8で、マイクロソフトが2024年10月の定例更新で修正したもの。 https://t.co/nrQTlbNmJX
@__kokumoto
2 Jan 2025
2468 Impressions
12 Retweets
21 Likes
15 Bookmarks
0 Replies
0 Quotes
Detect exploitation attempts of CVE-2024-49112, a critical LDAP Remote Code Execution (RCE) vulnerability that can severely impact unpatched Windows servers, with a set of Sigma rules from SOC Prime. #cybersecurity #infosec https://t.co/XSV6epl6dL
@SOC_Prime
2 Jan 2025
146 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49112 https://t.co/L77lKwMb0h https://t.co/uCPKh41zbZ
@electrocode
2 Jan 2025
299 Impressions
0 Retweets
1 Like
2 Bookmarks
0 Replies
0 Quotes
🚨 The first PoC exploit of 2025 is here, targeting a major #Windows #vulnerability, CVE-2024-49112. With a CVSS score of 9.8 it is also known as "LDAP Nightmare." 🚨 This zero-click exploit poses a severe risk to networks, especially those running ADDS. https://t.co/58g8D30jgi
@cyb3rint3l
2 Jan 2025
106 Impressions
1 Retweet
1 Like
0 Bookmarks
1 Reply
0 Quotes
CVE-2024-49112 POC Code Released #CVE-2024-49112 #LDAPNightmare #POCExploitCode https://t.co/T00mwvwj4T
@pravin_karthik
2 Jan 2025
77 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
PoC para CVE-2024-49112. Se trata de una vulnerabilidad en el protocolo ligero de acceso a directorios #LDAP de #Windows. Creado por SafeBreach Labs (publicado el 1 de enero de 2025). Para obtener el análisis técnico completo de la vulnerabilidad https://t.co/gylAER34kf
@Race_Banon
2 Jan 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
عجب CVE-2024-49112 باحالی هست یک آسیبپذیری بحرانی در پروتکل LDAP است که امکان اجرای کد از راه دور را برای مهاجمان از CVSS 9.8 فراهم میکند. این آسیبپذیری با امتیاز 10 ارزیابی شده است که نشاندهنده شدت بالای آن است.
@l0ni7_ir
2 Jan 2025
216 Impressions
0 Retweets
8 Likes
0 Bookmarks
1 Reply
0 Quotes
As someone asked for clarification, to avoid confusion, the PoC by SafeBreach that they named "LDAPNightmare" is not CVE-2024-49112 but another LDAP information leak bug fixed in the same month. How about now finding C2 Servers that pass LDAP, Malware and Botnets with a Tracker.
@byt3n33dl3
2 Jan 2025
108 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "10F567C3-3739-4F3D-B9E0-D2725D09CE0D",
"versionEndExcluding": "10.0.10240.20857",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "04D1F48B-C323-4062-B5E1-9700ADBB153C",
"versionEndExcluding": "10.0.10240.20857",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "29B44B5E-3D35-4A5B-A916-6E70923FAB7C",
"versionEndExcluding": "10.0.14393.7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "77EAFFB9-3053-4197-B52D-69F4F86C8FBA",
"versionEndExcluding": "10.0.14393.7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"matchCriteriaId": "5FA7C375-3A7C-4F34-B6E7-82C187B4F7AF",
"versionEndExcluding": "10.0.17763.6659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "576F141F-C874-4817-961A-2C4D2AB3DEA4",
"versionEndExcluding": "10.0.17763.6659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F814C24B-FA54-4B97-8387-6EE9AC269178",
"versionEndExcluding": "10.0.19044.5247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CF40E59-FC32-4047-8A63-EE0819A32962",
"versionEndExcluding": "10.0.19045.5247",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3B0836-B782-4C1A-B0D1-B6111CBC8DED",
"versionEndExcluding": "10.0.22621.4602",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "594D3E33-9ADE-47EF-8032-A5EDC948F92B",
"versionEndExcluding": "10.0.26100.2605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"matchCriteriaId": "361D1B8E-6E56-4B5F-85D1-D47114A10A81",
"versionEndExcluding": "10.0.14393.7606",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "11517523-F822-45BC-B347-C65F00B45202",
"versionEndExcluding": "10.0.17763.6659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AECABB2C-DACB-4BBD-8739-DDB00285B0A7",
"versionEndExcluding": "10.0.20348.2966",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37977CFB-B259-49B8-B0C5-85ECB40FE429",
"versionEndExcluding": "10.0.25398.1308",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E013EA3C-6F18-4CA4-AF5B-664F869B9A6D",
"versionEndExcluding": "10.0.26100.2605",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]