-
Notifications
You must be signed in to change notification settings - Fork 34
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
6c9611d
commit 0a3c1b4
Showing
1 changed file
with
52 additions
and
0 deletions.
There are no files selected for viewing
52 changes: 52 additions & 0 deletions
52
docs/advisories/20240906002-Microsoft-Vulnerability-Known-Exploitation.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,52 @@ | ||
# Microsoft Vulnerability Known Exploitation - 20240906002 | ||
|
||
## Overview | ||
|
||
The WA SOC has been made aware of active exploitation of published analysis and proof-of-concept (PoC) exploit for a critical zero-day vulnerability in the Windows Kernel. The vulnerability resides in the core of the Windows operating system, specifically within the ntoskrnl.exe process, also known as the Windows NT Operating System Kernel Executable. This kernel is a fundamental component of Windows, acting as the bridge between hardware and software, and is critical for the efficient functioning of numerous Windows services. The vulnerability stems from a race condition, a scenario where the outcome depends on the sequence or timing of uncontrollable events. In this case, an attacker who successfully exploits the race condition could elevate their privileges to the SYSTEM level, effectively gaining full control over the targeted machine. | ||
|
||
## What is vulnerable? | ||
|
||
| Product(s) Affected | CVE | CVSS | Severity | | ||
| ------------------- | ----------------------------------------------------------------- | ---- | -------- | | ||
| Windows 11 Version 22H2 for x64-based Systems | [CVE-2024-38106](https://nvd.nist.gov/vuln/detail/CVE-2024-38106) | 7.0 | High | | ||
| Windows 10 Version 1607 for 32-bit Systems | | ||
| Windows 10 for x64-based Systems | ||
| Windows 10 for 32-bit Systems | ||
| Windows 11 Version 24H2 for x64-based Systems | ||
| Windows 11 Version 24H2 for ARM64-based Systems | ||
| Windows Server 2016 (Server Core installation) | ||
| Windows Server 2016 | ||
| Windows Server 2022, 23H2 Edition (Server Core installation) | ||
| Windows 11 Version 23H2 for x64-based Systems | ||
| Windows 11 Version 23H2 for ARM64-based Systems | ||
| Windows 10 Version 22H2 for 32-bit Systems | ||
| Windows 10 Version 22H2 for ARM64-based Systems | ||
| Windows 10 Version 22H2 for x64-based Systems | ||
| Windows 11 Version 22H2 for x64-based Systems | ||
| Windows 11 Version 22H2 for ARM64-based Systems | ||
| Windows 10 Version 21H2 for x64-based Systems | ||
| Windows 10 Version 21H2 for ARM64-based Systems | ||
| Windows 11 version 21H2 for ARM64-based Systems | ||
| Windows 11 version 21H2 for x64-based Systems | ||
| Windows Server 2022 (Server Core installation) | ||
| Windows Server 2022 | ||
| Windows Server 2019 (Server Core installation) | ||
| Windows Server 2019 | ||
| Windows 10 Version 1809 for ARM64-based Systems | ||
| Windows 10 Version 1809 for x64-based Systems | ||
| Windows 10 Version 1809 for 32-bit Systems | ||
|
||
|
||
## What has been observed? | ||
|
||
There are reports of active exploitation in the wild. However, there is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. | ||
|
||
## Recommendation | ||
|
||
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours* (refer [Patch Management](../guidelines/patch-management.md)): | ||
|
||
- Microsoft: <https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38106> | ||
|
||
## Additional References | ||
|
||
- Security Online: <https://securityonline.info/cve-2024-38106-0-day-windows-kernel-vulnerability-exploited-in-the-wild-poc-published/> |