我們都知道這些年來很多單位一直在推廣 IPv6
希望借此可以解決未來可見的 IPv4 不夠使用的問題
但這麼多年來,我們還是無法認真的去使用 IPv6
甚至於 ~ 為了省下諸多麻煩事,我們只有在萬不得以的情況下才會轉向使用 IPv6
說起麻煩事 ~~~就一定要提這個微軟致今還沒公告的資安通報
通報編號為 CVE-2024-38063
適用的對象為 所有現行運作中的 Windows 系統
內容為
Windows 的 TCP/IP 網路堆棧中,存在一個嚴重的遠程代碼執行漏洞
惡意者可透過 IPv6 傳送封包針對對應 Windows 系統進行攻擊,進而在無任何認證狀態下啟動該系統的遠端程式碼
目前微軟還沒有推出相關補救的更新封包來解決此問題
因此應對的方式應該就只剩下禁用 IPv6 服務,全面轉回 IPv4
各別系統如何禁用,我這邊就不教學了
有能力開啟的人必定有能力關上
這部分是更新
微軟為其各版本作業系統提供解決此問題的更新包了
理論上系統更新功能中安裝後便可解決
如果系統更新檢查沒看到的,可在底下列表找到對應的檔案下載連結
ug 13, 2024
Windows 11 Version 24H2 for ARM64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2012 R2 (Server Core installation)
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2012 R2
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2012 (Server Core installation)
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2012
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
-
Remote Code Execution
Critical
- 6.1.7601.27277
- 6.1.7601.27277
Aug 13, 2024
Windows Server 2008 R2 for x64-based Systems Service Pack 1
-
Remote Code Execution
Critical
- 6.1.7601.27277
- 6.1.7601.27277
Aug 13, 2024
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
-
Remote Code Execution
Critical
- 6.0.6003.22825
- 6.0.6003.22825
Aug 13, 2024
Windows Server 2008 for x64-based Systems Service Pack 2
-
Remote Code Execution
Critical
- 6.0.6003.22825
- 6.0.6003.22825
Aug 13, 2024
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
-
Remote Code Execution
Critical
- 6.0.6003.22825
- 6.0.6003.22825
Aug 13, 2024
Windows Server 2008 for 32-bit Systems Service Pack 2
-
Remote Code Execution
Critical
- 6.0.6003.22825
- 6.0.6003.22825
Aug 13, 2024
Windows Server 2016 (Server Core installation)
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2016
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 1607 for x64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 1607 for 32-bit Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 for x64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 for 32-bit Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2022, 23H2 Edition (Server Core installation)
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 11 Version 23H2 for x64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 11 Version 23H2 for ARM64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 22H2 for 32-bit Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 22H2 for ARM64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 22H2 for x64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 11 Version 22H2 for x64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 11 Version 22H2 for ARM64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 21H2 for x64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 21H2 for ARM64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 21H2 for 32-bit Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 11 version 21H2 for ARM64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 11 version 21H2 for x64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2022 (Server Core installation)
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2022
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2019 (Server Core installation)
-
Remote Code Execution
Critical
Aug 13, 2024
Windows Server 2019
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 1809 for ARM64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 1809 for x64-based Systems
-
Remote Code Execution
Critical
Aug 13, 2024
Windows 10 Version 1809 for 32-bit Systems
-
Remote Code Execution
Critical
就這樣算是結案了
如果因為關上導致內網的 IP 數量問題,建議您趁此機會想個備案
因為沒意外的話,下半年度外部稽核時可能會被問及此問題
以上簡單報告完畢 ~ 各位勞苦功高的 IT 們辛苦了
針對 CrowdStrike 更新出包造成全球客戶大當機事件,微軟推出官方修正工具包
[免費] nomoreransom 多種勒索病毒解除工具軟體下載 (更新至 2024 年版)
ASUS ExpertBook B5 (B5404CMA) 輕 薄 堅固 新一代 AI 技術加持 更加十項全能 為專業人士設計的 AI 商務筆電 開箱小聊
SHARP AQUOS wish4 實測篇
Waymax X7 Pro 電動滑板車 帶著我穿梭都會小巷的超便利代步小車 簡單開箱
如果您想贊助提神良方,鼓勵編輯部更努力 (低銷 50)
可以點我前往 或是掃 QR CODE
想要跟我們聊天,請加入傻瓜狐狸的粉絲團
原文發表於傻瓜狐狸的雜碎物品
留言列表