CVE-2021-24094:
Windows TCP/IP Remote Code Execution Vulnerability (CVE-2021-24094)
Score
A numerical rating that indicates how dangerous this vulnerability is.
9.8Critical- Published Date:Feb 25, 2021
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:18.6
- EPSS Percentile:95%
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
Windows TCP/IP Remote Code Execution Vulnerability (CVE-2021-24094)
Overview
This vulnerability affects the Windows TCP/IP implementation and could lead to remote code execution on vulnerable Windows systems. The flaw exists in the way the Windows TCP/IP stack processes certain network packets. An attacker who successfully exploits this vulnerability could gain the ability to execute code in the context of the operating system, potentially taking complete control of the affected system. The vulnerability is particularly concerning because it could potentially be exploited without user interaction, making it a candidate for wormable attacks across networks.
Remediation
- To address this vulnerability, Microsoft has released security updates. System administrators should apply the appropriate patches immediately to all affected systems. The following steps are recommended:
- 1. Apply the security update provided by Microsoft through Windows Update or manually download and install the appropriate patch from the Microsoft Update Catalog.
- 2. If patching is not immediately possible, consider implementing workarounds such as:
- Restricting access to potentially vulnerable systems using firewall rules
- Implementing network segmentation to limit the potential spread of any exploitation
- Monitoring network traffic for unusual activity
- 3. Ensure all Windows systems are configured to receive and apply security updates automatically.
- 4. After applying the patch, restart affected systems to ensure the update takes effect.
References
- 1. Microsoft Security Advisory: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24094
- 2. Microsoft February 2021 Security Updates: https://msrc.microsoft.com/update-guide/
- 3. Microsoft Security Response Center Blog: https://msrc-blog.microsoft.com/
- 4. CISA Known Exploited Vulnerabilities Catalog: https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.