CVE-2024-38193

Published Aug 13, 2024

Last updated 6 months ago

Overview

Description
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Source
secure@microsoft.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7.8
Impact score
5.9
Exploitability score
1.8
Vector string
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
Exploit added on
Aug 13, 2024
Exploit action due
Sep 3, 2024
Required action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Weaknesses

nvd@nist.gov
NVD-CWE-noinfo
secure@microsoft.com
CWE-416

Social media

Hype score
Not currently trending
  1. CVE-2025-21418 is very similar with CVE-2024-38193. The vulnerability is UAF in afd.sys. CVE-2024-38193 afdcreate->afdbind->afdlisten CVE-2025-21418 afdcreate->afdbind->afdaccept

    @ln_work94293

    18 Feb 2025

    27 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Exploiting a use-after-free vulnerability in the afd.sys Windows driver (CVE-2024-38193) https://t.co/Q7TBBY7qM9 Credits Luca Ginex #windows #infosec https://t.co/exTJUgeCH7

    @0xor0ne

    2 Jan 2025

    8609 Impressions

    47 Retweets

    135 Likes

    60 Bookmarks

    0 Replies

    0 Quotes

  3. Windows Zero-Day Vulnerability CVE-2024-38193 Exploited in the Wild: PoC Published https://t.co/0twcdeXNEG

    @H4ckManac

    9 Dec 2024

    5666 Impressions

    14 Retweets

    48 Likes

    20 Bookmarks

    0 Replies

    0 Quotes

  4. #CybersecurityNews 🚨 A critical Windows vulnerability (CVE-2024-38193) could allow privilege escalation and arbitrary code execution. Linked to the Lazarus Group, proof-of-concept code is now public. Patch available! 🛡️ #WindowsDriverExploits #Privilege… https://t.co/0aXRnumQPJ

    @TweetThreatNews

    9 Dec 2024

    8 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  5. Windows Zero-Day Vulnerability CVE-2024-38193 Exploited in the Wild: PoC Published https://t.co/I632HOYUe7

    @Dinosn

    9 Dec 2024

    15365 Impressions

    101 Retweets

    281 Likes

    122 Bookmarks

    1 Reply

    3 Quotes

  6. Windows Zero-Day Vulnerability CVE-2024-38193 Exploited in the Wild: PoC Published Explore the in-depth analysis of CVE-2024-38193, a critical use-after-free flaw in the afd.sys Windows driver. Understand the exploitation process and potential impact https://t.co/LVTO0tdkcr

    @the_yellow_fall

    9 Dec 2024

    1590 Impressions

    8 Retweets

    28 Likes

    20 Bookmarks

    0 Replies

    0 Quotes

  7. 🗣 Windows Zero-Day Vulnerability CVE-2024-38193 Exploited in the Wild: PoC Published https://t.co/40B6wjmtLt

    @fridaysecurity

    9 Dec 2024

    30 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. I published a post describing the exploitation process for CVE-2024-38193, a use-after-free vulnerability in the afd.sys Windows driver. Hope you enjoy it! :) https://t.co/tzazvZxOqp

    @LukeGix

    3 Dec 2024

    9345 Impressions

    63 Retweets

    184 Likes

    92 Bookmarks

    3 Replies

    0 Quotes

Configurations