Overview
- Description
- Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Social media
- Hype score
- Not currently trending
GitHub - varwara/CVE-2024-35250: PoC for the Untrusted Pointer Dereference in the ks.sys driver https://t.co/Fjh7U4m7sc
@akaclandestine
27 Oct 2024
1206 Impressions
6 Retweets
14 Likes
6 Bookmarks
0 Replies
0 Quotes
Windows カーネルモード・ドライバの脆弱性 CVE-2024-35250 が FIX:PoC も公開 https://t.co/a5mn5wyatr #BugBounty #CyberAttack #Devcore #EoP #Exploit #PoCExploit #Pwn2Own #Vulnerability #Windows
@iototsecnews
23 Oct 2024
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The severity of the Elevation of Privilege - Windows Kernel-Mode Driver (CVE-2024-35250) vulnerability has increased. On October 13, a PoC of the exploit, released by user varwara, appeared on GitHub. #Microsoft #kssys #KernelStreaming #DEVCORE ➡️ https://t.co/FyCxnFMmrI https:
@leonov_av
22 Oct 2024
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit 1. CVE-2024-35250: Windows 11 Kernel-Mode Driver EoP/LPE https://t.co/UxEoBwWNoA 2. CVE-2024-44193: iTunes for Windows - LPE https://t.co/C3p0B828YB 3. CVE-2024-9464: Palo Alto Expedition Authenticated CI https://t.co/5OPNnJ7NGY
@42mayfly
21 Oct 2024
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
GitHub - varwara/CVE-2024-35250: PoC for the Untrusted Pointer Dereference in the ks.sys driver https://t.co/Fjh7U4m7sc
@akaclandestine
19 Oct 2024
1158 Impressions
4 Retweets
12 Likes
4 Bookmarks
0 Replies
0 Quotes
#exploit 1. CVE-2024-35250: Windows 11 Kernel-Mode Driver EoP/LPE https://t.co/JCHRLHXVib 2. CVE-2024-44193: iTunes for Windows - LPE https://t.co/se0HV2pUtI 3. CVE-2024-9464: Palo Alto Expedition Authenticated CI https://t.co/G5lQTBLjx8
@airacaaaa
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#exploit Streaming vulnerabilities from Windows Kernel - Proxying to Kernel Part 1 (CVE-2024-30084, CVE-2024-35250): https://t.co/PCeCq0JWCZ Part 2 (CVE-2024-30090): https://t.co/TjOAfoSNWv ]-> https://t.co/heJDE8ujc3
@ksg93rd
2654 Impressions
13 Retweets
55 Likes
21 Bookmarks
0 Replies
0 Quotes
#exploit Streaming vulnerabilities from Windows Kernel - Proxying to Kernel Part 1 (CVE-2024-30084, CVE-2024-35250): https://t.co/aQ7z3rFyrV Part 2 (CVE-2024-30090): https://t.co/qcD48Qk9xt ]-> https://t.co/TXaaRcNG71
@airacaaaa
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【情报】新Windows提权漏洞CVE-2024-35250🚨 PoC for the Untrusted Pointer Dereference in the ks.sys driver😢 Github地址:https://t.co/qHy6OicYzT 提权适用的Windows版本挺多的,但动作很明显,实测大部分XDR都拦截动态行为了🫣 #cybersecurity #CyberSafety #redteam #blueteam #exploit #CVE https://t.co/rAgpZJPnmL
@AabyssZG
6731 Impressions
37 Retweets
113 Likes
56 Bookmarks
3 Replies
0 Quotes
1. CVE-2024-35250: Windows 11 Kernel-Mode Driver EoP/LPE https://t.co/vCoFWg4cK2 2. CVE-2024-44193: iTunes for Windows - LPE https://t.co/TaEcUZybXC 3. CVE-2024-9464: Palo Alto Expedition Authenticated CI https://t.co/nZDbcw79y5
@ShaiiikShoaiiib
71 Impressions
0 Retweets
5 Likes
2 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF7733FD-F870-4578-A567-9900AD6C78E3", "versionEndExcluding": "10.0.10240.20680" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D96DA51E-404E-49AE-B852-56FF8A1CEEA6", "versionEndExcluding": "10.0.14393.7070" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B52F95E-6080-46C6-B4B6-E2B3F3E78456", "versionEndExcluding": "10.0.17763.5936" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CEAF689-E8DB-4D3C-BC2E-B386BC077BC5", "versionEndExcluding": "10.0.19044.4529" }, { "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "970F54FC-F4ED-49B9-BE94-96B7212FD149", "versionEndExcluding": "10.0.19045.4529" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84ECD6C0-8C47-4D2F-82B5-4F8C0BBC5FEE", "versionEndExcluding": "10.0.22000.3019" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E80DF17-1F27-474E-B147-9F5B6C494300", "versionEndExcluding": "10.0.22621.3737" }, { "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4258468C-56CC-45C0-B510-FC833E942876", "versionEndExcluding": "10.0.22631.3737" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2ACA9287-B475-4AF7-A4DA-A7143CEF9E57" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA61AAF0-D769-4287-AA5C-EFDAD067E9F1", "versionEndExcluding": "10.0.14393.7070" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12F9D974-A968-4CBB-81D8-C73B76DD284A", "versionEndExcluding": "10.0.17763.5936" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "498A643B-0180-4AD3-BD7C-5E3CEB0FD112", "versionEndExcluding": "10.0.20348.2522" }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0EA59E2D-57B2-4E8B-937A-3EB51A3AD285", "versionEndExcluding": "10.0.25398.950" } ], "operator": "OR" } ] } ]