Improper input validation in Windows Server Update Service allows an unauthorized attacker to perform tampering over a network.
| Vendor | Product | Versions |
|---|---|---|
| Microsoft | Windows Server 2012 | 6.2.9200.0, 6.2.9200.0, 6.3.9600.0, 6.3.9600.0, 10.0.14393.0, 10.0.14393.0, 10.0.17763.0, 10.0.17763.0, 10.0.20348.0, 10.0.25398.0, 10.0.26100.0, 10.0.26100.0 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| microsoft | windows server 2012 r2 | mitre_affected | 90% |
| microsoft | windows | mitre_affected | 90% |
| microsoft | windows server 2019 (server core installation) | mitre_affected | 90% |
| microsoft | windows server 2016 (server core installation) | mitre_affected | 90% |
| microsoft | windows server 2012 (server core installation) | mitre_affected | 90% |
Added a detailed description of the vulnerability, marked it as actively exploited, and included new tags related to WSUS and tampering.
Initial creation