Out-of-bounds Read (CWE-125)
A vulnerability in the Windows Network Driver Interface Specification (NDIS) could allow an unauthenticated attacker to cause a denial of service condition. This is classified as an out-of-bounds read vulnerability.
An attacker exploiting this vulnerability could cause a denial of service condition, potentially disrupting network operations on affected Windows systems. This could lead to system instability or crashes, impacting the availability of network services and resources.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Patches are available. Microsoft has released updates to address this vulnerability for affected Windows versions.
1. Apply the latest security updates provided by Microsoft for the affected Windows versions. 2. Ensure that only trusted devices and users have access to the local network to reduce the risk of exploitation. 3. Monitor network traffic for unusual patterns that might indicate exploitation attempts. 4. Keep all Windows systems and software up to date with the latest security patches. 5. Consider implementing network segmentation to limit the potential impact of successful attacks.
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Detection for the vulnerability has been added to Qualys (92149)
A CVSS base score of 6.5 has been assigned.
NVD published the first details for CVE-2024-38048
Feedly found the first article mentioning CVE-2024-38048. See article
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.04% (Percentile: 13%)