01 漏洞概况
DWM桌面窗口管理器是自Windows Vista以来Microsoft Windows中的合成窗口管理器,它允许使用硬件加速来呈现 Windows 的图形用户界面。它最初是为了启用部分新的“ Windows Aero ”用户体验而创建的,它允许诸如透明度、3D 窗口切换等效果。
其中存在特权提升漏洞,攻击者可以利用该漏洞在目标系统上获取更高的权限。
02 漏洞处置
综合处置优先级:高
漏洞信息
漏洞名称
Windows DWM 核心库特权提升漏洞
漏洞编号
CVE编号
CVE-2024-30051
漏洞评估
披露时间
2024-05-14
漏洞类型
权限提升
危害评级
高危
公开程度
PoC未公开
威胁类型
远程
利用情报
在野利用
是
影响产品
产品名称
Windows系统
受影响版本
Windows Server 2016 (Server Core installation),Windows Server 2016,Windows 10 Version 1607 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 11 Version 22H2 for x64-based Systems,Windows 11 Version 22H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 11 version 21H2 for ARM64-based Systems,Windows 11 version 21H2 for x64-based Systems,Windows Server 2022 (Server Core installation),Windows Server 2022 (Server Core installation),Windows Server 2022,Windows Server 2022,Windows Server 2019 (Server Core installation),Windows Server 2019,Windows 10 Version 1809 for ARM64-based Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 11 Version 23H2 for x64-based Systems,Windows 11 Version 23H2 for ARM64-based Systems,Windows 10 Version 22H2 for 32-bit Systems,Windows 10 Version 22H2 for ARM64-based Systems,Windows 10 Version 22H2 for x64-based Systems
影响范围
广
有无修复补丁
有
01 漏洞概况
其中存在特权提升漏洞,攻击者可以利用该漏洞在目标系统上获取更高的权限。
02 漏洞处置
综合处置优先级:高
漏洞信息 |
漏洞名称 |
Windows DWM 核心库特权提升漏洞 |
漏洞编号 |
CVE编号 |
CVE-2024-30051 |
漏洞评估 |
披露时间 |
2024-05-14 |
漏洞类型 |
权限提升 |
|
危害评级 |
高危 |
|
公开程度 |
PoC未公开 |
|
威胁类型 |
远程 |
|
利用情报 |
在野利用 |
是 |
影响产品 |
产品名称 |
Windows系统 |
受影响版本 |
Windows Server 2016 (Server Core installation),Windows Server 2016,Windows 10 Version 1607 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 11 Version 22H2 for x64-based Systems,Windows 11 Version 22H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 11 version 21H2 for ARM64-based Systems,Windows 11 version 21H2 for x64-based Systems,Windows Server 2022 (Server Core installation),Windows Server 2022 (Server Core installation),Windows Server 2022,Windows Server 2022,Windows Server 2019 (Server Core installation),Windows Server 2019,Windows 10 Version 1809 for ARM64-based Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 11 Version 23H2 for x64-based Systems,Windows 11 Version 23H2 for ARM64-based Systems,Windows 10 Version 22H2 for 32-bit Systems,Windows 10 Version 22H2 for ARM64-based Systems,Windows 10 Version 22H2 for x64-based Systems |
|
影响范围 |
广 |
|
有无修复补丁 |
有 |
03 漏洞排查
用户尽快排查Windows系统版本是否在Windows Server 2016 (Server Core installation),Windows Server 2016,Windows 10 Version 1607 for x64-based Systems,Windows 10 Version 1607 for 32-bit Systems,Windows 11 Version 22H2 for x64-based Systems,Windows 11 Version 22H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 11 version 21H2 for ARM64-based Systems,Windows 11 version 21H2 for x64-based Systems,Windows Server 2022 (Server Core installation),Windows Server 2022 (Server Core installation),Windows Server 2022,Windows Server 2022,Windows Server 2019 (Server Core installation),Windows Server 2019,Windows 10 Version 1809 for ARM64-based Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 11 Version 23H2 for x64-based Systems,Windows 11 Version 23H2 for ARM64-based Systems,Windows 10 Version 22H2 for 32-bit Systems,Windows 10 Version 22H2 for ARM64-based Systems,Windows 10 Version 22H2 for x64-based Systems中。若存在系统使用,极大可能会受到影响。
04 修复方案
1、官方修复方案:
微软官方已更新受影响软件的安全补丁,用户可根据不同系统版本下载安装对应的安全补丁,安全更新链接如下:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051
05 时间线
2024.05.14 厂商发布安全补丁
2024.05.16 安迈信科安全运营团队发布通告
原文始发于微信公众号(安迈信科应急响应中心):Windows DWM 核心库特权提升漏洞
03 漏洞排查
04 修复方案
微软官方已更新受影响软件的安全补丁,用户可根据不同系统版本下载安装对应的安全补丁,安全更新链接如下:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30051
05 时间线
原文始发于微信公众号(安迈信科应急响应中心):Windows DWM 核心库特权提升漏洞
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论