CVE-2024-26216

Improper Link Resolution Before File Access ('Link Following') (CWE-59)

Published: Apr 9, 2024

010
CVSS 7.3EPSS 0.04%High
CVE info copied to clipboard

Summary

Windows File Server Resource Management Service Elevation of Privilege Vulnerability. This vulnerability is associated with CWE-59, which is "Improper Link Resolution Before File Access ('Link Following')". The vulnerability has a CVSS v3.1 base score of 7.3, indicating a high severity. It requires local access and low privileges, with user interaction needed for exploitation.

Impact

If exploited, this vulnerability could allow an attacker to elevate their privileges on the affected system. The CVSS score indicates high impact on confidentiality, integrity, and availability. This means an attacker could potentially access sensitive information, modify system files or data, and disrupt system operations. Given the nature of the File Server Resource Management Service, this could affect file storage and access management across the network.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available for this vulnerability. Microsoft released the patch on April 9, 2024, as part of their regular security updates. The patch can be obtained through the Microsoft Update Guide.

Mitigation

1. Apply the security update provided by Microsoft as soon as possible. 2. Implement the principle of least privilege, ensuring users and processes only have the minimum necessary permissions. 3. Monitor and audit file server activities for any suspicious behavior. 4. Restrict local access to critical systems where possible. 5. Educate users about the risks of interacting with untrusted files or links, as user interaction is required for exploitation. 6. Consider implementing additional access controls and monitoring on the File Server Resource Management Service. 7. Regularly update and patch Windows systems to protect against this and other vulnerabilities.

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92128)

Apr 9, 2024 at 12:00 AM
CVSS

A CVSS base score of 7.3 has been assigned.

Apr 9, 2024 at 5:05 PM / microsoft
First Article

Feedly found the first article mentioning CVE-2024-26216. See article

Apr 9, 2024 at 5:06 PM / Microsoft Security Advisories - MSRC
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Apr 9, 2024 at 5:07 PM
CVE Assignment

NVD published the first details for CVE-2024-26216

Apr 9, 2024 at 5:15 PM
EPSS

EPSS Score was set to: 0% (Percentile: 8%)

Apr 10, 2024 at 11:45 AM
EPSS

EPSS Score was set to: 0.04% (Percentile: 7.9%)

Apr 10, 2024 at 6:54 PM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows
+null more

Patches

Microsoft
+null more

Links to Mitre Att&cks

T1547.009: Shortcut Modification
+null more

Attack Patterns

CAPEC-132: Symlink Attack
+null more

News

A tumultuous, titanic Patch Tuesday as Microsoft makes some changes – Sophos News
The two issues from Lenovo are likewise related to boot processes, are characterized by Microsoft as important-severity Security Feature Bypass faults and are thought to be less likely to be exploited within the next 30 days. At patch time, three issues, all important-severity faults affecting Windows, are known to be under active exploit in the wild.
Microsoft April 2024 Patch Tuesday fixes 150 security flaws, 67 RCEs
Only three critical vulnerabilities were fixed as part of the April 2024 Patch Tuesday updates, but there are over 67 remote code execution bugs. More than half of the RCE flaws are found within Microsoft SQL drivers, likely sharing a common flaw.
Microsoft Patch Tuesday Απριλίου 2024: Διορθώνονται 150 ευπάθειες - SecNews.gr
Microsoft Patch Tuesday Απριλίου 2024: Διορθώνονται 150 ευπάθειες SecNews.gr
A tumultuous, titanic Patch Tuesday as Microsoft makes some changes – Source: news.sophos.com
The two issues from Lenovo are likewise related to boot processes, are characterized by Microsoft as important-severity Security Feature Bypass faults and are thought to be less likely to be exploited within the next 30 days. At patch time, three issues, all important-severity faults affecting Windows, are known to be under active exploit in the wild.
Microsoft releases April 2024 Patch fixing 150 flaws, two actively exploited, 67 RCE
Microsoft WDAC SQL Server ODBC Driver Remote Code Execution Vulnerability Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerability
See 18 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:Required
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI