CVE-2024-38062

Out-of-bounds Read (CWE-125)

Published: Jul 9, 2024

010
CVSS 7.8EPSS 0.04%High
CVE info copied to clipboard

Summary

An out-of-bounds read vulnerability exists in the License Update Field Type 0xCC functionality of Microsoft Windows CLIPSP.SYS 10.0.22621 Build 22621. A specially crafted license blob can lead to denial of service. An attacker can use the NtQuerySystemInformation function call to trigger this vulnerability.

Impact

This vulnerability allows an attacker with low privileges to potentially gain elevated privileges on the affected system. The impact is severe, with high potential for compromising the confidentiality, integrity, and availability of the system. An attacker could exploit this to read sensitive information, modify system data, or disrupt system operations. The attack vector is local, meaning the attacker needs prior access to the target system, but the attack complexity is low, and no user interaction is required.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available for this vulnerability. Microsoft has released updates to address this issue on July 9, 2024. These updates are available through the Microsoft Update Guide.

Mitigation

To mitigate this vulnerability, it is strongly recommended to apply the security updates provided by Microsoft as soon as possible. Priority should be given to patching the following affected systems: 1. Windows 11 (versions 21H2, 22H2, 23H2) 2. Windows 10 (versions 1607, 1809, 21H2, 22H2) 3. Windows Server 2022 (including 23H2) 4. Windows Server 2019 5. Windows Server 2016 Additionally, as this is a local attack vector, implementing strong access controls and the principle of least privilege can help reduce the risk of exploitation. Regular system monitoring for unusual activities and maintaining up-to-date security practices are also recommended.

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92149)

Jul 9, 2024 at 7:53 AM
CVSS

A CVSS base score of 7.8 has been assigned.

Jul 9, 2024 at 5:05 PM / microsoft
CVE Assignment

NVD published the first details for CVE-2024-38062

Jul 9, 2024 at 5:15 PM
First Article

Feedly found the first article mentioning CVE-2024-38062. See article

Jul 9, 2024 at 5:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Jul 9, 2024 at 6:53 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.2%)

Jul 10, 2024 at 10:14 AM
Trending

This CVE started to trend in security discussions

Jul 12, 2024 at 9:32 AM
Trending

This CVE stopped trending in security discussions

Jul 12, 2024 at 10:08 AM
CVSS

A CVSS base score of 7.8 has been assigned.

Oct 28, 2024 at 8:57 PM / nvd
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_11_22h2
+null more

Patches

Microsoft
+null more

Attack Patterns

CAPEC-540: Overread Buffers
+null more

References

Microsoft Windows CLIPSP.SYS License Update Field Type 0xC9 out-of-bounds read vulnerability
It provides the functions used when handling most of the requests involving licensing, notably the implementation of many use cases involved with the SystemPolicyInformation class used in conjunction with NtQuerySystemInformation. In this case the vulnerability is an OOB-read of 4 bytes at offset 4 in the license blob of type .

News

Xerox Security Bulletin XRX24- 013 for Xerox® FreeFlow® Print Server v2 / Windows® 10
The methods of Security Patch Update delivery and install are over the network using FreeFlow® Print Server Update Manager or directly from Microsoft® using Windows® Update service, and using media (i.e., USB). The FreeFlow® Print Server engineering team receives new patch updates in January, April, July, and October, and will test them for supported Printer products (such as iGen®5 printers) prior to delivery for customer install.
Update Wed Aug 28 14:36:59 UTC 2024
Update Wed Aug 28 14:36:59 UTC 2024
Update Tue Aug 27 14:38:24 UTC 2024
Update Tue Aug 27 14:38:24 UTC 2024
Update Sat Aug 17 14:31:27 UTC 2024
Update Sat Aug 17 14:31:27 UTC 2024
AI, election security headline discussions at Black Hat and DEF CON
Easterly said many technology companies have voluntarily adopted CISA’s secure-by-design standards, which pledges to bake cybersecurity and vulnerability reviews into the design process of all new hardware and software products. Talos released a new Snort rule set that detects attempts to exploit some of the vulnerabilities disclosed Tuesday.
See 34 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI