Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2024-30073: Windows Security Zone Mapping Security Feature Bypass Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2024-30073: Windows Security Zone Mapping Security Feature Bypass Vulnerability

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
09/10/2024
Created
09/11/2024
Added
09/10/2024
Modified
09/12/2024

Description

Microsoft Windows: CVE-2024-30073: Windows Security Zone Mapping Security Feature Bypass Vulnerability

Solution(s)

  • microsoft-windows-windows_10-1507-kb5043083
  • microsoft-windows-windows_10-1607-kb5043051
  • microsoft-windows-windows_10-1809-kb5043050
  • microsoft-windows-windows_10-21h2-kb5043064
  • microsoft-windows-windows_10-22h2-kb5043064
  • microsoft-windows-windows_11-21h2-kb5043067
  • microsoft-windows-windows_11-22h2-kb5043076
  • microsoft-windows-windows_11-23h2-kb5043076
  • microsoft-windows-windows_11-24h2-kb5043080
  • microsoft-windows-windows_server_2012-kb5043125
  • microsoft-windows-windows_server_2012_r2-kb5043138
  • microsoft-windows-windows_server_2016-1607-kb5043051
  • microsoft-windows-windows_server_2019-1809-kb5043050
  • microsoft-windows-windows_server_2022-21h2-kb5042881
  • microsoft-windows-windows_server_2022-22h2-kb5042881
  • microsoft-windows-windows_server_2022-23h2-kb5043055
  • msft-kb5043049-1dca0e4e-ea35-48dd-89a6-dec18eed82da
  • msft-kb5043049-5810fab4-b5a1-4a64-87fb-fff4af81f6f8
  • msft-kb5043049-c3be5737-d21e-4422-a479-b0c664f7fa8a
  • msft-kb5043087-70b8073b-cd75-40a0-b56c-164ecf9f75b3
  • msft-kb5043087-76a2e9b3-a189-4fe4-86bb-5883ff72aee6
  • msft-kb5043092-3cbea16d-fee8-4498-8eee-0db0de2057d4
  • msft-kb5043129-e33e803f-1b25-4ead-9555-11b1c2520c78
  • msft-kb5043135-050dc0b3-198b-44cf-b232-4f07b65a64ab
  • msft-kb5043135-62fbaf76-0812-4f0f-8926-ead627bdeb12

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;