{"api_version":"1","generated_at":"2026-05-12T23:15:56+00:00","cve":"CVE-2024-43455","urls":{"html":"https://cve.report/CVE-2024-43455","api":"https://cve.report/api/cve/CVE-2024-43455.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2024-43455","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2024-43455"},"summary":{"title":"Windows Remote Desktop Licensing Service Spoofing Vulnerability","description":"Windows Remote Desktop Licensing Service Spoofing Vulnerability","state":"PUBLISHED","assigner":"microsoft","published_at":"2024-09-10 17:15:32","updated_at":"2026-05-11 18:33:19"},"problem_types":["CWE-20","NVD-CWE-noinfo","CWE-20 CWE-20: Improper Input Validation"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"secure@microsoft.com","type":"Secondary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","data":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","version":"3.1"}}],"references":[{"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455","name":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455","refsource":"secure@microsoft.com","tags":["Patch","Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2024-43455","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-43455","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2019","version":"affected 10.0.17763.0 10.0.17763.6293 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2019 (Server Core installation)","version":"affected 10.0.17763.0 10.0.17763.6293 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2022","version":"affected 10.0.20348.0 10.0.20348.2700 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2022, 23H2 Edition (Server Core installation)","version":"affected 10.0.25398.0 10.0.25398.1128 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2016","version":"affected 10.0.14393.0 10.0.14393.7336 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2016 (Server Core installation)","version":"affected 10.0.14393.0 10.0.14393.7336 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2008 Service Pack 2","version":"affected 6.0.6003.0 6.0.6003.22870 custom","platforms":["32-bit Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2008 Service Pack 2 (Server Core installation)","version":"affected 6.0.6003.0 6.0.6003.22870 custom","platforms":["32-bit Systems","x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2008  Service Pack 2","version":"affected 6.0.6003.0 6.0.6003.22870 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2008 R2 Service Pack 1","version":"affected 6.1.7601.0 6.1.7601.27320 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2008 R2 Service Pack 1 (Server Core installation)","version":"affected 6.1.7601.0 6.1.7601.27320 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2012","version":"affected 6.2.9200.0 6.2.9200.25073 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2012 (Server Core installation)","version":"affected 6.2.9200.0 6.2.9200.25073 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2012 R2","version":"affected 6.3.9600.0 6.3.9600.22175 custom","platforms":["x64-based Systems"]},{"source":"CNA","vendor":"Microsoft","product":"Windows Server 2012 R2 (Server Core installation)","version":"affected 6.3.9600.0 6.3.9600.22175 custom","platforms":["x64-based Systems"]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2008","cpe6":"-","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"x64","cpe13":"*"},{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2008","cpe6":"-","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"x86","cpe13":"*"},{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2008","cpe6":"r2","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"x64","cpe13":"*"},{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2012","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"x64","cpe13":"*"},{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2012","cpe6":"r2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"x64","cpe13":"*"},{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2016","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2019","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2022","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2024","cve_id":"43455","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"microsoft","cpe5":"windows_server_2022_23h2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2024","cve_id":"43455","cve":"CVE-2024-43455","epss":"0.047980000","percentile":"0.895540000","score_date":"2026-05-11","updated_at":"2026-05-12 00:01:17"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2024-43455","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-09-10T18:16:37.405963Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-09-10T18:28:36.395Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"platforms":["x64-based Systems"],"product":"Windows Server 2019","vendor":"Microsoft","versions":[{"lessThan":"10.0.17763.6293","status":"affected","version":"10.0.17763.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2019 (Server Core installation)","vendor":"Microsoft","versions":[{"lessThan":"10.0.17763.6293","status":"affected","version":"10.0.17763.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2022","vendor":"Microsoft","versions":[{"lessThan":"10.0.20348.2700","status":"affected","version":"10.0.20348.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2022, 23H2 Edition (Server Core installation)","vendor":"Microsoft","versions":[{"lessThan":"10.0.25398.1128","status":"affected","version":"10.0.25398.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2016","vendor":"Microsoft","versions":[{"lessThan":"10.0.14393.7336","status":"affected","version":"10.0.14393.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2016 (Server Core installation)","vendor":"Microsoft","versions":[{"lessThan":"10.0.14393.7336","status":"affected","version":"10.0.14393.0","versionType":"custom"}]},{"platforms":["32-bit Systems"],"product":"Windows Server 2008 Service Pack 2","vendor":"Microsoft","versions":[{"lessThan":"6.0.6003.22870","status":"affected","version":"6.0.6003.0","versionType":"custom"}]},{"platforms":["32-bit Systems","x64-based Systems"],"product":"Windows Server 2008 Service Pack 2 (Server Core installation)","vendor":"Microsoft","versions":[{"lessThan":"6.0.6003.22870","status":"affected","version":"6.0.6003.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2008  Service Pack 2","vendor":"Microsoft","versions":[{"lessThan":"6.0.6003.22870","status":"affected","version":"6.0.6003.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2008 R2 Service Pack 1","vendor":"Microsoft","versions":[{"lessThan":"6.1.7601.27320","status":"affected","version":"6.1.7601.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2008 R2 Service Pack 1 (Server Core installation)","vendor":"Microsoft","versions":[{"lessThan":"6.1.7601.27320","status":"affected","version":"6.1.7601.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2012","vendor":"Microsoft","versions":[{"lessThan":"6.2.9200.25073","status":"affected","version":"6.2.9200.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2012 (Server Core installation)","vendor":"Microsoft","versions":[{"lessThan":"6.2.9200.25073","status":"affected","version":"6.2.9200.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2012 R2","vendor":"Microsoft","versions":[{"lessThan":"6.3.9600.22175","status":"affected","version":"6.3.9600.0","versionType":"custom"}]},{"platforms":["x64-based Systems"],"product":"Windows Server 2012 R2 (Server Core installation)","vendor":"Microsoft","versions":[{"lessThan":"6.3.9600.22175","status":"affected","version":"6.3.9600.0","versionType":"custom"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.17763.6293","versionStartIncluding":"10.0.17763.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.17763.6293","versionStartIncluding":"10.0.17763.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.20348.2700","versionStartIncluding":"10.0.20348.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.25398.1128","versionStartIncluding":"10.0.25398.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.14393.7336","versionStartIncluding":"10.0.14393.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.14393.7336","versionStartIncluding":"10.0.14393.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*","versionEndExcluding":"6.0.6003.22870","versionStartIncluding":"6.0.6003.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*","versionEndExcluding":"6.0.6003.22870","versionStartIncluding":"6.0.6003.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*","versionEndExcluding":"6.0.6003.22870","versionStartIncluding":"6.0.6003.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*","versionEndExcluding":"6.1.7601.27320","versionStartIncluding":"6.1.7601.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2008_R2:*:*:*:*:*:*:x64:*","versionEndExcluding":"6.1.7601.27320","versionStartIncluding":"6.1.7601.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*","versionEndExcluding":"6.2.9200.25073","versionStartIncluding":"6.2.9200.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*","versionEndExcluding":"6.2.9200.25073","versionStartIncluding":"6.2.9200.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*","versionEndExcluding":"6.3.9600.22175","versionStartIncluding":"6.3.9600.0","vulnerable":true},{"criteria":"cpe:2.3:o:microsoft:windows_server_2012_R2:*:*:*:*:*:*:x64:*","versionEndExcluding":"6.3.9600.22175","versionStartIncluding":"6.3.9600.0","vulnerable":true}],"negate":false,"operator":"OR"}]}],"datePublic":"2024-09-10T07:00:00.000Z","descriptions":[{"lang":"en-US","value":"Windows Remote Desktop Licensing Service Spoofing Vulnerability"}],"metrics":[{"cvssV3_1":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20: Improper Input Validation","lang":"en-US","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2024-12-31T23:03:18.267Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"name":"Windows Remote Desktop Licensing Service Spoofing Vulnerability","tags":["vendor-advisory"],"url":"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43455"}],"title":"Windows Remote Desktop Licensing Service Spoofing Vulnerability"}},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2024-43455","datePublished":"2024-09-10T16:54:12.507Z","dateReserved":"2024-08-14T01:08:33.515Z","dateUpdated":"2024-12-31T23:03:18.267Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2024-09-10 17:15:32","lastModifiedDate":"2026-05-11 18:33:19","problem_types":["CWE-20","NVD-CWE-noinfo","CWE-20 CWE-20: Improper Input Validation"],"metrics":{"cvssMetricV31":[{"source":"secure@microsoft.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*","matchCriteriaId":"2127D10C-B6F3-4C1D-B9AA-5D78513CC996"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*","matchCriteriaId":"AB425562-C0A0-452E-AABE-F70522F15E1A"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*","matchCriteriaId":"AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:x64:*","matchCriteriaId":"F73D1308-DB13-4B6C-A66F-5542FDCA749C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:x64:*","matchCriteriaId":"8968BAC8-A1DB-4F88-89F8-4BE47919C247"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.14393.7336","matchCriteriaId":"A6291C92-7D32-4CC2-B601-FAF5B70F3BFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.17763.6293","matchCriteriaId":"BD2C9E88-C858-4B3D-A8C5-251DD6B69FD6"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.20348.2700","matchCriteriaId":"4399F533-0094-43CF-872E-FC8E4A21A904"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.25398.1128","matchCriteriaId":"FCB2DB55-B6D1-4D28-802F-D300BE10E9A0"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2024","CveId":"43455","Ordinal":"1","Title":"Windows Remote Desktop Licensing Service Spoofing Vulnerability","CVE":"CVE-2024-43455","Year":"2024"},"notes":[{"CveYear":"2024","CveId":"43455","Ordinal":"1","NoteData":"Windows Remote Desktop Licensing Service Spoofing Vulnerability","Type":"Description","Title":"Windows Remote Desktop Licensing Service Spoofing Vulnerability"}]}}}