Out-of-bounds Read (CWE-125)
A Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability has been identified in multiple versions of Microsoft Windows. This vulnerability is related to an out-of-bounds read issue in the kernel streaming WOW thunk service driver, which could potentially allow an attacker to elevate their privileges on the system.
If exploited, this vulnerability could allow an attacker with low privileges to gain high-level access to the system. The impact is severe, as it affects the confidentiality, integrity, and availability of the system, all rated as HIGH. An attacker could potentially read sensitive information, modify system data, or disrupt system operations. The vulnerability has a base score of 7.8, indicating a high severity level.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Microsoft has released security updates to address this vulnerability. The patch was initially added on July 9, 2024, and is available through the Microsoft Update Guide.
1. Apply the security updates provided by Microsoft as soon as possible. 2. Prioritize patching for critical systems and those exposed to potential attackers. 3. Implement the principle of least privilege to minimize the impact of potential exploits. 4. Monitor systems for unusual activities that might indicate exploitation attempts. 5. Keep all Windows systems and software up to date with the latest security patches.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Detection for the vulnerability has been added to Qualys (92149)
A CVSS base score of 7.8 has been assigned.
NVD published the first details for CVE-2024-38057
Feedly found the first article mentioning CVE-2024-38057. See article
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.04% (Percentile: 9.2%)
This CVE started to trend in security discussions
This CVE stopped trending in security discussions