CVE |
CVE-2021-24086 |
Published |
09-Feb-21 |
Severity: |
Severe |
Details: |
Windows TCP/IP Denial of Service Vulnerability |
|
|
CVSS Score |
4.4 |
CVSSv3 Score |
7.5 |
|
|
Attack Vector |
Network |
Attack Complexity |
Low |
Privileges Required |
None |
User Interaction |
The vulnerable system can be exploited without any interaction from a user |
|
|
Impact |
|
Impact on Confidentiality |
None |
Impact on Integrity |
None |
Impact to Availability |
High |
|
|
Exploit Code in the Wild |
Unknown |
Exploit Code Maturity |
Unproven |
Remediation Level |
Vendor Patch |
|
|
Exploitability Assessment |
Creating a DoS exploit may not be too difficult. But it does not have a major financial gain for the attacker. |
|
|
Affected OS |
Windows Server, version 20H2 (Server Core Installation) |
|
Windows 10 Version 20H2 |
|
Windows 10 Version 2004 |
|
Windows Server, version 1909 |
|
Windows Server 2012 R2 |
|
Windows Server 2012 |
|
Windows Server 2008 R2 |
|
Windows Server 2008 |
|
Windows 8.1 |
|
Windows 7 |
|
Windows Server 2016 |
|
Windows 10 Version 1607 |
|
Windows Server 2019 |
|
Windows 10 Version 1803 |
|
Windows RT 8.1 |
|
Window 10 64 bit |
|
Windows 10 32 bit |
|
Windows 10 Version 1809 |
|
|
|
|