First published: Tue Jan 09 2024(Updated: )
Last updated 31 October 2024
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libarchive | <=3.4.3-2+deb11u1<=3.6.2-1+deb12u1<=3.7.4-1 | 3.7.4-1.1 |
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =23H2 | |
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Windows 11 | =23H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.17763.5329 | |
Microsoft Windows 10 | <10.0.19044.3930 | |
Microsoft Windows 10 | <10.0.19045.3930 | |
Windows 11 | <10.0.22000.2713 | |
Windows 11 | <10.0.22621.3007 | |
Windows 11 | <10.0.22631.3007 | |
Microsoft Windows Server 2019 | <10.0.17763.5329 | |
Microsoft Windows Server 2022 | <10.0.20348.2227 | |
Microsoft Windows Server 2022 | <10.0.25398.643 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20696 is rated as critical, as it allows for remote code execution on the affected systems.
To mitigate CVE-2024-20696, apply the relevant security updates available from Microsoft for your affected Windows version.
CVE-2024-20696 affects multiple versions including Windows Server 2019, Windows Server 2022, and Windows 10 and 11 in specific builds.
CVE-2024-20696 is a remote code execution vulnerability, allowing attackers to execute arbitrary code from a remote location.
At this time, there are no publicly reported exploits for CVE-2024-20696, but immediate patching is recommended to prevent potential attacks.