CVE-2021-24086:
Windows TCP/IP Denial of Service Vulnerability (CVE-2021-24086)
Score
A numerical rating that indicates how dangerous this vulnerability is.
7.5High- Published Date:Feb 25, 2021
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:47.2
- EPSS Percentile:98%
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:3.6
- Confidentiality Impact:NONE
- Integrity Impact:NONE
- Availability Impact:HIGH
Description Preview
Windows TCP/IP Denial of Service Vulnerability (CVE-2021-24086)
Overview
This vulnerability exists in the Windows TCP/IP stack and could allow an unauthenticated remote attacker to cause a denial of service condition on affected systems. When successfully exploited, the vulnerability could render the target system unresponsive or unstable, potentially requiring a system restart to restore normal functionality. The vulnerability affects various versions of Windows operating systems and could be triggered by sending specially crafted packets to the vulnerable system. The issue stems from improper handling of certain TCP/IP packets by the Windows networking components.
Remediation
- To mitigate this vulnerability, apply the security updates provided by Microsoft. The following actions are recommended:
- 1. Install the latest security updates from Microsoft for affected Windows systems.
- 2. Apply the security patches released in Microsoft's February 2021 security updates.
- 3. If patching is not immediately possible, consider implementing network-level filtering to block potentially malicious traffic.
- 4. Monitor systems for signs of attack, such as unexpected system crashes or networking issues.
- 5. Ensure that network security monitoring is in place to detect potential exploitation attempts.
- 6. Consider implementing network segmentation to limit the exposure of vulnerable systems.
References
- 1. Microsoft Security Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24086
- 2. Packet Storm Security Analysis: http://packetstormsecurity.com/files/163499/Windows-TCP-IP-Denial-Of-Service.html
- 3. Microsoft Security Response Center: https://msrc.microsoft.com/
- 4. National Vulnerability Database: https://nvd.nist.gov/vuln/detail/CVE-2021-24086
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.