
Cloud Vulnerability DB
A community-led vulnerabilities database
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability (CVE-2024-43453) was disclosed on October 8, 2024. This vulnerability affects various versions of Microsoft Windows Server, including Server 2008, 2012, 2016, 2019, and 2022. The vulnerability received a CVSSv3 score of 8.8 and is rated as important (NVD).
CVE-2024-43453 is a Remote Code Execution (RCE) vulnerability in Windows Routing and Remote Access Service (RRAS). The vulnerability has been assigned a CVSSv3 score of 8.8 HIGH with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. Microsoft has classified this vulnerability as 'Exploitation Less Likely' based on their Exploitability Index (Tenable Blog).
An attacker could exploit this vulnerability without authentication by either targeting a vulnerable server with a specially crafted protocol message or tricking a user to submit a request to a malicious server. Successful exploitation could lead to remote code execution on the vulnerable machine (Tenable Blog).
Microsoft has released patches for affected versions of Windows Server, including Server 2008 SP2, Server 2008 R2 SP1, Server 2012, Server 2012 R2, Server 2016, Server 2019, Server 2022, and Server 2022 23H2. Organizations are advised to apply the available patches as soon as possible (NVD).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."