First published: Tue Jul 09 2024(Updated: )
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | ||
Microsoft Windows Server | =sp2 | |
Microsoft Windows Server | =r2-sp1 | |
Microsoft Windows Server | ||
Microsoft Windows Server | =r2 | |
Microsoft Windows Server 2016 | <10.0.14393.7159 | |
Microsoft Windows Server 2019 | <10.0.17763.6054 | |
Microsoft Windows Server 2022 | <10.0.20348.2582 | |
Microsoft Windows Server 2022 | <10.0.25398.1009 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38067 is classified as a Denial of Service vulnerability affecting Windows Online Certificate Status Protocol (OCSP) Server.
To mitigate CVE-2024-38067, apply the relevant patches provided by Microsoft for the affected versions of Windows Server.
CVE-2024-38067 affects several Microsoft Windows Server versions, including 2008, 2012, 2016, 2019, and 2022.
Yes, CVE-2024-38067 can lead to Denial of Service conditions, resulting in service interruptions.
Yes, Windows Server 2016 requires specific patches to address the vulnerabilities associated with CVE-2024-38067.