Out-of-bounds Read (CWE-125)
An out-of-bounds read vulnerability exists in the License Update Field Type 0xCC functionality of Microsoft Windows CLIPSP.SYS 10.0.22621 Build 22621. A specially crafted license blob can lead to denial of service. An attacker can use the NtQuerySystemInformation function call to trigger this vulnerability.
This vulnerability allows an attacker with low privileges to potentially gain elevated privileges on the affected system. The impact is severe, with high potential for compromising the confidentiality, integrity, and availability of the system. An attacker could exploit this to read sensitive information, modify system data, or disrupt system operations. The attack vector is local, meaning the attacker needs prior access to the target system, but the attack complexity is low, and no user interaction is required.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available for this vulnerability. Microsoft has released updates to address this issue on July 9, 2024. These updates are available through the Microsoft Update Guide.
To mitigate this vulnerability, it is strongly recommended to apply the security updates provided by Microsoft as soon as possible. Priority should be given to patching the following affected systems: 1. Windows 11 (versions 21H2, 22H2, 23H2) 2. Windows 10 (versions 1607, 1809, 21H2, 22H2) 3. Windows Server 2022 (including 23H2) 4. Windows Server 2019 5. Windows Server 2016 Additionally, as this is a local attack vector, implementing strong access controls and the principle of least privilege can help reduce the risk of exploitation. Regular system monitoring for unusual activities and maintaining up-to-date security practices are also recommended.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Detection for the vulnerability has been added to Qualys (92149)
A CVSS base score of 7.8 has been assigned.
NVD published the first details for CVE-2024-38062
Feedly found the first article mentioning CVE-2024-38062. See article
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.04% (Percentile: 9.2%)
This CVE started to trend in security discussions
This CVE stopped trending in security discussions
A CVSS base score of 7.8 has been assigned.