Windows TCP/IP Denial of Service Vulnerability
This indicates an attack attempt to exploit a Denial of Service Vulnerability in Microsoft Windows.This vulnerability is due insufficient handling of maliciously crafted packets. Successful exploitation can result in a denial of service condition on the victim machine.
Windows 10 Version 1803 for 32-bit Systems
Windows 10 Version 1803 for x64-based Systems
Windows 10 Version 1803 for ARM64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows Server 2019
Windows Server 2019 (Server Core installation)
Windows 10 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016
Windows Server 2016 (Server Core installation)
Windows 7 for 32-bit Systems Service Pack 1
Windows 7 for x64-based Systems Service Pack 1
Windows 8.1 for 32-bit systems
Windows 8.1 for x64-based systems
Windows RT 8.1
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2012
Windows Server 2012 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1909 for ARM64-based Systems
Windows Server, version 1909 (Server Core installation)
Windows 10 Version 2004 for 32-bit Systems
Windows 10 Version 2004 for ARM64-based Systems
Windows 10 Version 2004 for x64-based Systems
Windows Server, version 2004 (Server Core installation)
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 20H2 for 32-bit Systems
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Denial of Service: Remote attackers can crash vulnerable systems.
Apply the most recent upgrade or patch from the vendor.
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24086
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24086
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag:
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
WolfgangSesin | http://www.sesin.at | Source WolfgangSesin 1625272583682682880 | 2023/02/14 |
WolfgangSesin | https://www.sesin.at/2023/02/14/multiple-security-updates-a... | Source WolfgangSesin 1625272583682682880 | 2023/02/14 |
www_sesin_at | http://www.sesin.at | Source www_sesin_at 1625272588439093249 | 2023/02/14 |
www_sesin_at | https://www.sesin.at/2023/02/14/multiple-security-updates-a... | Source www_sesin_at 1625272588439093249 | 2023/02/14 |
List of frequently cited URLs
URL | Num of Times Referred to |
---|---|
alerts.vulmon.com | 258 |
msrc.microsoft.com | 126 |
msrc-blog.microsoft.com | 5 |
github.com | 4 |
unit42.paloaltonetworks.com | 4 |
twitter.com | 3 |
doar-e.github.io | 3 |
blog.quarkslab.com | 3 |
packetstormsecurity.com | 3 |
www.bleepingcomputer.com | 3 |
User | URL | Info Source |
---|---|---|
WolfgangSesin | sesin.at | Show Tweet |
WolfgangSesin | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
www_sesin_at | sesin.at | Show Tweet |
Name | URL |
---|---|
0vercl0k/CVE-2021-24086 | https://github.com/0vercl0k/CVE-2021-24086 |
xuejilinhan/CVE-2021-24086 | https://github.com/xuejilinhan/CVE-2021-24086 |
Name | URL |
---|---|
0vercl0k/CVE-2021-24086 | github.com |
xuejilinhan/CVE-2021-24086 | github.com |