Vulnerability Description
Windows libarchive Remote Code Execution Vulnerability
CVSS Score
7.3
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows 11 22H2 | < 10.0.22621.3007 |
| Microsoft | Windows 11 23H2 | < 10.0.22631.3007 |
| Microsoft | Windows Server 2022 23H2 | - |
Related Weaknesses (CWE)
References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697PatchVendor Advisory
- http://www.openwall.com/lists/oss-security/2024/06/04/2
- http://www.openwall.com/lists/oss-security/2024/06/05/1
- https://github.com/advisories/GHSA-w6xv-37jv-7cjr
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20697PatchVendor Advisory
- https://www.zerodayinitiative.com/blog/2024/4/17/cve-2024-20697-windows-libarchi
FAQ
What is CVE-2024-20697?
CVE-2024-20697 is a vulnerability with a CVSS score of 7.3 (HIGH). Windows libarchive Remote Code Execution Vulnerability
How severe is CVE-2024-20697?
CVE-2024-20697 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-20697?
Check the references section above for vendor advisories and patch information. Affected products include: Microsoft Windows 11 22H2, Microsoft Windows 11 23H2, Microsoft Windows Server 2022 23H2.