First published: Tue Jan 09 2024(Updated: )
Windows Server Key Distribution Service Security Feature Bypass
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =23H2 | |
Windows 11 | =23H2 | |
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.14393.6614 | |
Microsoft Windows 10 | <10.0.17763.5329 | |
Microsoft Windows 10 | <10.0.19044.3930 | |
Microsoft Windows 10 | <10.0.19045.3930 | |
Windows 11 | <10.0.22000.2713 | |
Windows 11 | <10.0.22621.3007 | |
Windows 11 | <10.0.22631.3007 | |
Microsoft Windows Server 2019 | <10.0.17763.5329 | |
Microsoft Windows Server 2022 | <10.0.20348.2227 | |
Microsoft Windows Server 2022 | <10.0.25398.643 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21316 has been assessed with a high-severity rating due to its potential for a security feature bypass.
To mitigate CVE-2024-21316, apply the relevant security patches provided by Microsoft for the affected Windows products and versions.
CVE-2024-21316 affects various versions of Windows 10, Windows 11, and Windows Server products including specific editions and architectures.
Exploitation of CVE-2024-21316 could allow unauthorized access or manipulation of the Key Distribution Service in affected Microsoft products.
Currently, there are no documented workarounds for CVE-2024-21316, so applying patches is the recommended course of action.