diff --git a/docs/advisories/20240906002-Microsoft-Vulnerability-Known-Exploitation.md b/docs/advisories/20240906002-Microsoft-Vulnerability-Known-Exploitation.md new file mode 100644 index 00000000..df3a6640 --- /dev/null +++ b/docs/advisories/20240906002-Microsoft-Vulnerability-Known-Exploitation.md @@ -0,0 +1,52 @@ +# Microsoft Vulnerability Known Exploitation - 20240906002 + +## Overview + +The WA SOC has been made aware of active exploitation of published analysis and proof-of-concept (PoC) exploit for a critical zero-day vulnerability in the Windows Kernel. The vulnerability resides in the core of the Windows operating system, specifically within the ntoskrnl.exe process, also known as the Windows NT Operating System Kernel Executable. This kernel is a fundamental component of Windows, acting as the bridge between hardware and software, and is critical for the efficient functioning of numerous Windows services. The vulnerability stems from a race condition, a scenario where the outcome depends on the sequence or timing of uncontrollable events. In this case, an attacker who successfully exploits the race condition could elevate their privileges to the SYSTEM level, effectively gaining full control over the targeted machine. + +## What is vulnerable? + +| Product(s) Affected | CVE | CVSS | Severity | +| ------------------- | ----------------------------------------------------------------- | ---- | -------- | +| Windows 11 Version 22H2 for x64-based Systems | [CVE-2024-38106](https://nvd.nist.gov/vuln/detail/CVE-2024-38106) | 7.0 | High | +| Windows 10 Version 1607 for 32-bit Systems | +| Windows 10 for x64-based Systems +| Windows 10 for 32-bit Systems +| Windows 11 Version 24H2 for x64-based Systems +| Windows 11 Version 24H2 for ARM64-based Systems +| Windows Server 2016 (Server Core installation) +| Windows Server 2016 +| Windows Server 2022, 23H2 Edition (Server Core installation) +| Windows 11 Version 23H2 for x64-based Systems +| Windows 11 Version 23H2 for ARM64-based Systems +| Windows 10 Version 22H2 for 32-bit Systems +| Windows 10 Version 22H2 for ARM64-based Systems +| Windows 10 Version 22H2 for x64-based Systems +| Windows 11 Version 22H2 for x64-based Systems +| Windows 11 Version 22H2 for ARM64-based Systems +| Windows 10 Version 21H2 for x64-based Systems +| Windows 10 Version 21H2 for ARM64-based Systems +| Windows 11 version 21H2 for ARM64-based Systems +| Windows 11 version 21H2 for x64-based Systems +| Windows Server 2022 (Server Core installation) +| Windows Server 2022 +| Windows Server 2019 (Server Core installation) +| Windows Server 2019 +| Windows 10 Version 1809 for ARM64-based Systems +| Windows 10 Version 1809 for x64-based Systems +| Windows 10 Version 1809 for 32-bit Systems + + +## What has been observed? + +There are reports of active exploitation in the wild. However, there is no evidence of exploitation affecting Western Australian Government networks at the time of publishing. + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *48 hours* (refer [Patch Management](../guidelines/patch-management.md)): + +- Microsoft: + +## Additional References + +- Security Online: