- Description
- Windows Kernel Elevation of Privilege Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability
- Exploit added on
- Mar 4, 2024
- Exploit action due
- Mar 25, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
- secure@microsoft.com
- CWE-822
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
[Research] Bypassing Windows Kernel Mitigations: Part 2 - CVE-2024-21338 Dive into bypassing kCFG with a Local Privilege Escalation exploit in appid.sys (CVE-2024-21338). https://t.co/iuKVrBHZqk Coming soon: Part 3! https://t.co/1l7oWWq6qp
@hackyboiz
12 Jan 2025
2070 Impressions
21 Retweets
60 Likes
35 Bookmarks
0 Replies
0 Quotes
Bypassing Windows Kernel Mitigations Part 2 - CVE-2024-21338 Dive into bypassing kCFG with a Local Privilege Escalation exploit in appid.sys (CVE-2024-21338). https://t.co/iuKVrBIxfS Coming soon: Part 3! https://t.co/0Rq0ATS5ZT
@hackyboiz
12 Jan 2025
43 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
【独自】米国サイバーセキュリティ・社会基盤安全保障庁(CISA)の既知の悪用された脆弱性カタログで、以下の3件の脆弱性のランサムウェアによる悪用が確認済みとなった。 - WindowsカーネルIOCTLの権限昇格CVE-2024-21338 - Adobe… https://t.co/oJlYDo1JFS https://t.co/8wc0frfQI0
@__kokumoto
2294 Impressions
1 Retweet
16 Likes
4 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A1689DFD-D52D-4121-BFD7-DBF2BE4E7DE8",
"versionEndExcluding": "10.0.17763.5458"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C78776CC-3A9C-41A3-8BEB-D71D92F6579D",
"versionEndExcluding": "10.0.19044.4046"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "806CA6D2-42B2-4244-A5ED-D23E6DD56772",
"versionEndExcluding": "10.0.19045.4046"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3F7F8173-9E59-48E4-98C9-4BEB6AE79451",
"versionEndExcluding": "10.0.22000.2777"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "84EDBE52-EFE0-4D6D-AA76-698B6F9687D1",
"versionEndExcluding": "10.0.22621.3155"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "900D1DA2-6DA7-4681-966A-B9973B1329EA",
"versionEndExcluding": "10.0.22631.3155"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A9098F92-79E7-4762-A37C-99B4CFA8CDD1",
"versionEndExcluding": "10.0.17763.5458"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5C8F0436-3AFE-48BD-AE92-8F8392DD0A1D",
"versionEndExcluding": "10.0.20348.2322"
},
{
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "62322DCD-FDD1-4E54-A51A-08D68890E7DE",
"versionEndIncluding": "10.0.25398.709"
}
],
"operator": "OR"
}
]
}
]