Windows Telephony Service Remote Code Execution Vulnerability
CVE-2024-43627

8.8HIGH

Key Information:

Summary

A vulnerability exists in the Windows Telephony Service that allows an attacker to execute arbitrary code remotely. This weakness could be exploited through specially crafted requests, leading to unauthorized access and control over the affected systems. Prompt application of security patches and updates is essential to mitigate potential exploits. Organizations using supported versions of Windows should evaluate their systems for this vulnerability to enhance their cybersecurity posture.

Affected Version(s)

Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20826

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7515

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.6532

References

EPSS Score

0% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed
.