• 我的位置:
  • 首页
  • -
  • 漏洞预警
  • -
  • 应用
  • -
  • 网间控制报文协议 (ICMP) 远程代码执行漏洞
    • CNNVD编号:未知
    • 危害等级: 超危 
    • CVE编号:CVE-2023-23415
    • 漏洞类型: 未知
    • 威胁类型:未知
    • 厂       商:未知
    • 漏洞来源:深信服
    • 发布时间:2023-03-21
    • 更新时间:2023-03-21

    漏洞简介

    2023 年 3 月 15 日,深信服安全团队监测到一则 Windows TCP/IP协议栈组件存在网间控制报文协议(ICMP)远程代码执行漏洞的信息,漏洞编号:CVE-2023-23415,漏洞威胁等级:严重。
    该漏洞是由于判断不严格,攻击者可利用该漏洞在未授权的情况下,构造恶意数据执行远程代码执行攻击,最终获取服务器最高权限

    漏洞公示

    暂无

    参考网站

    暂无

    受影响实体

    目前受影响的 Windows 版本:
    Windows 10 Version 20H2 for 32-bit Systems
    Windows 10 Version 20H2 for x64-based Systems
    Windows Server 2022 (Server Core installation)
    Windows Server 2022 (Server Core installation)
    Windows Server 2022
    Windows Server 2022
    Windows Server 2019 (Server Core installation)
    Windows Server 2019
    Windows 10 Version 1809 for ARM64-based Systems
    Windows 10 Version 1809 for x64-based Systems
    Windows 10 Version 1809 for 32-bit Systems
    Windows Server 2012 R2 (Server Core installation)
    Windows Server 2012 R2 (Server Core installation)
    Windows Server 2012 R2
    Windows Server 2012 R2
    Windows Server 2012 (Server Core installation)
    Windows Server 2012 (Server Core installation)
    Windows Server 2012
    Windows Server 2012

    Windows Server 2008 R2 for x64-based Systems Service Pack
    (Server Core installation)
    Windows Server 2008 R2 for x64-based Systems Service Pack
    (Server Core installation)
    Windows Server 2008 R2 for x64-based Systems Service Pack
    Windows Server 2008 R2 for x64-based Systems Service Pack
    Windows Server 2008 for x64-based Systems Service Pack 2
    (Server Core installation)
    Windows Server 2008 for x64-based Systems Service Pack 2
    (Server Core installation)
    Windows Server 2008 for x64-based Systems Service Pack 2
    Windows Server 2008 for x64-based Systems Service Pack 2
    Windows Server 2008 for 32-bit Systems Service Pack 2
    (Server Core installation)
    Windows Server 2008 for 32-bit Systems Service Pack 2
    (Server Core installation)
    Windows Server 2008 for 32-bit Systems Service Pack 2
    Windows Server 2008 for 32-bit Systems Service Pack 2
    Windows 10 Version 20H2 for ARM64-based Systems
    Windows Server 2016 (Server Core installation)

    Windows Server 2016
    Windows 10 Version 1607 for x64-based Systems
    Windows 10 Version 1607 for 32-bit Systems
    Windows 10 for x64-based Systems
    Windows 10 for 32-bit Systems
    Windows 10 Version 22H2 for 32-bit Systems
    Windows 10 Version 22H2 for ARM64-based Systems
    Windows 10 Version 22H2 for x64-based Systems
    Windows 11 Version 22H2 for x64-based Systems
    Windows 11 Version 22H2 for ARM64-based Systems
    Windows 10 Version 21H2 for x64-based Systems
    Windows 10 Version 21H2 for ARM64-based Systems
    Windows 10 Version 21H2 for 32-bit Systems
    Windows 11 version 21H2 for ARM64-based Systems
    Windows 11 version 21H2 for x64-based Systems

    补丁

    解决方案
    修复建议
    1.如何检测补丁安装情况
    在“设置”-“更新与安全”-Windows 更新”-“查看更新历史
    记录”-“质量更新”中检查是否存在 2023-03 的更新。
    或在命令行(cmd)中执行 systeminfo,检查是否有漏洞对应的补丁。 该漏洞各版的补丁可以在
    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415
    中安装更新程序一栏中找到。
    2.官方修复建议
    当前官方已发布受影响版本的对应补丁,建议受影响的用户及时
    更新官方的安全补丁。链接如下:
    https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415
    打补丁/升级方法:
    在“设置”-“更新与安全”-Windows 更新”中选择检查更新