CVE-2024-37284: Vulnerability Analysis & Exploit Details

Status: Received - Published on 21-01-2025

CVE-2024-37284
Vulnerability Scoring

5.5
/10

Attack Complexity Details

  • Attack Complexity: Low Impact
  • Attack Vector: LOCAL
  • Privileges Required: None
  • Scope: UNCHANGED
  • User Interaction: REQUIRED

CIA Impact Definition

  • Confidentiality:
  • Integrity:
  • Availability: HIGH IMPACT

CVE-2024-37284 Vulnerability Summary

Improper handling of alternate encoding occurs when Elastic Defend on Windows systems attempts to scan a file or process encoded as a multibyte character. This leads to an uncaught exception causing Elastic Defend to crash which in turn will prevent it from quarantining the file and/or killing the process.

Need help fixing CVEs? Check out our Step-by-Step Guide on How to Fix CVEs.

Access Complexity Graph for CVE-2024-37284

Impact Analysis for CVE-2024-37284

CVE-2024-37284: Detailed Information and External References

References

CWE

CWE-755

CVSS3 Source

bressers@elastic.co

CVSS3 Type

Secondary

CVSS3 Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H

Protect Your Infrastructure: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.

Recently Published CVEs