개요
Windows 에서 발생하는 취약점 해결하는 보안 업데이트를 발표하였습니다. 해당하는 제품 사용자는 최신 버전으로 업데이트하시기 바랍니다.
대상 제품
- Windows 10 for 32-bit Systems
- Windows Server 2022, 23H2 Edition (Server Core installation)
- Windows 11 Version 23H2 for x64-based Systems
- Windows 11 Version 23H2 for ARM64-based Systems
- Windows 10 Version 22H2 for 32-bit Systems
- Windows 10 Version 22H2 for ARM64-based Systems
- Windows Server 2012 R2 (Server Core installation)
- Windows Server 2012 R2 (Server Core installation)
- Windows Server 2012 R2
- Windows Server 2012 R2
- Windows Server 2016 (Server Core installation)
- Windows Server 2016
- Windows 10 Version 1607 for x64-based Systems
- Windows 10 Version 1607 for 32-bit Systems
- Windows 10 for x64-based Systems
- Windows 10 Version 22H2 for x64-based Systems
- Windows 11 Version 22H2 for x64-based Systems
- Windows 11 Version 22H2 for ARM64-based Systems
- Windows 10 Version 21H2 for x64-based Systems
- Windows 10 Version 21H2 for ARM64-based Systems
- Windows 10 Version 21H2 for 32-bit Systems
- Windows 11 version 21H2 for ARM64-based Systems
- Windows 11 version 21H2 for x64-based Systems
- Windows Server 2022 (Server Core installation)
- Windows Server 2022
- Windows Server 2019 (Server Core installation)
- Windows Server 2019
- Windows 10 Version 1809 for ARM64-based Systems
- Windows 10 Version 1809 for x64-based Systems
- Windows 10 Version 1809 for 32-bit Systems
- Windows 11 Version 24H2 for x64-based Systems
- Windows 11 Version 24H2 for ARM64-based Systems
해결된 취약점
Windows Scripting Engine에서 발생하는 중요 등급의 원격 코드 실행 취약점 (CVE-2024-38178)
취약점 패치
최신 업데이트를 통해 취약점 패치가 제공되었습니다. 참고 사이트[2]의 “Security Updates” 섹션에 따라 최신 취약점 패치 버전으로 업데이트 하시기 바랍니다.
참고 사이트
[1] CVE-2024-38178 Detail
https://nvd.nist.gov/vuln/detail/CVE-2024-38178
[2] Windows Scripting Engine Memory Corruption Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38178