Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 29 Aug 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-427 |
Wed, 02 Oct 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft windows 10 Microsoft windows 11 Microsoft windows Server 2016 Microsoft windows Server 2019 Microsoft windows Server 2022 |
|
| CPEs | cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Microsoft
Microsoft windows 10 Microsoft windows 11 Microsoft windows Server 2016 Microsoft windows Server 2019 Microsoft windows Server 2022 |
|
| References |
| |
| Metrics |
ssvc
|
Thu, 26 Sep 2024 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A DLL Hijacking caused by drive remapping combined with a poisoning of the activation cache in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated attacker to elevate from a medium integrity process to a high integrity process without the intervention of a UAC prompt. | |
| Title | Medium to High Integrity Privilege Escalation in Microsoft Windows | |
| Weaknesses | CWE-426 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Fortra
Published:
Updated: 2025-08-29T20:22:43.078Z
Reserved: 2024-07-15T21:02:43.641Z
Link: CVE-2024-6769
Updated: 2024-09-26T20:45:24.498Z
Status : Deferred
Published: 2024-09-26T21:15:07.787
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-6769
No data.
OpenCVE Enrichment
No data.