First published: Tue Jan 09 2024(Updated: )
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2022 23H2 | ||
Windows 11 | =23H2 | |
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Windows 11 | =23H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.19044.3930 | |
Microsoft Windows 10 | <10.0.19045.3930 | |
Windows 11 | <10.0.22000.2713 | |
Windows 11 | <10.0.22000.2713 | |
Windows 11 | <10.0.22621.3007 | |
Windows 11 | <10.0.22621.3007 | |
Windows 11 | <10.0.22631.3007 | |
Windows 11 | <10.0.22631.3007 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20681 has a severity rating of Important, indicating a significant elevation of privilege risk.
To remediate CVE-2024-20681, ensure that you install the recommended security updates provided by Microsoft.
CVE-2024-20681 affects various versions of Windows 10, Windows 11, and Windows Server 2022.
You can verify if your system is affected by CVE-2024-20681 by checking the installed version of Windows against the vulnerability's affected software list.
CVE-2024-20681 is an elevation of privilege vulnerability that allows attackers to gain elevated permissions on affected systems.