CVE Vulnerabilities

CVE-2024-26248

Incorrect Implementation of Authentication Algorithm

Published: Apr 09, 2024 | Modified: Jan 08, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Windows Kerberos Elevation of Privilege Vulnerability

Weakness

The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.

Affected Software

NameVendorStart VersionEnd Version
Windows_10_1507Microsoft*10.0.10240.20596 (excluding)
Windows_10_1607Microsoft*10.0.14393.6897 (excluding)
Windows_10_1809Microsoft*10.0.17763.5696 (excluding)
Windows_10_21h2Microsoft*10.0.19044.4291 (excluding)
Windows_10_22h2Microsoft*10.0.19045.4291 (excluding)
Windows_11_21h2Microsoft*10.0.22000.2899 (excluding)
Windows_11_22h2Microsoft*10.0.22621.3447 (excluding)
Windows_11_23h2Microsoft*10.0.22631.3447 (excluding)
Windows_server_2008Microsoft–sp2 (including)–sp2 (including)
Windows_server_2008Microsoftr2-sp1 (including)r2-sp1 (including)
Windows_server_2012Microsoft- (including)- (including)
Windows_server_2012Microsoftr2 (including)r2 (including)
Windows_server_2016Microsoft*10.0.14393.6897 (excluding)
Windows_server_2019Microsoft*10.0.17763.5696 (excluding)
Windows_server_2022Microsoft*10.0.20348.2402 (excluding)
Windows_server_2022_23h2Microsoft*10.0.25398.830 (excluding)

References