Use of Uninitialized Resource (CWE-908)
A Windows TCP/IP Information Disclosure Vulnerability has been identified. This vulnerability is related to the use of an uninitialized resource which can lead to the exposure of sensitive information to an unauthorized actor. The vulnerability affects multiple versions of Windows operating systems, including Windows 10, Windows 11, and various Windows Server editions.
This vulnerability has a CVSS v3.1 base score of 7.5, which is considered HIGH severity. The attack vector is network-based, with low attack complexity and requires no user interaction or privileges. The primary impact is on confidentiality, with a HIGH confidentiality impact rating. There is no impact on integrity or availability. An attacker exploiting this vulnerability could potentially gain unauthorized access to sensitive information transmitted over TCP/IP networks on affected Windows systems.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available for this vulnerability. Microsoft has released updates to address this issue. The patch was added on July 9, 2024, and is available through the Microsoft Update Guide. Affected systems and their corresponding patch versions are: Windows Server 2019: patch to version 10.0.17763.6054 or later Windows Server 2022: patch to version 10.0.20348.2582 or later Windows 10 21H2: patch to version 10.0.19044.4651 or later Windows 10 1809: patch to version 10.0.17763.6054 or later Windows Server 2022 23H2: patch to version 10.0.25398.1009 or later Windows Server 2008 R2 SP1 and SP2: patch available (version not specified) Windows Server 2012 and 2012 R2: patch available (version not specified) Windows 10 1507: patch to version 10.0.10240.20710 or later Windows 11 22H2: patch to version 10.0.22621.3880 or later Windows 10 1607: patch to version 10.0.14393.7159 or later Windows 11 21H2: patch to version 10.0.22000.3079 or later Windows 11 23H2: patch to version 10.0.22631.3880 or later Windows Server 2016: patch to version 10.0.14393.7159 or later Windows 10 22H2: patch to version 10.0.19045.4651 or later
1. Apply the security updates provided by Microsoft as soon as possible to all affected systems. 2. Prioritize patching for internet-facing systems and critical infrastructure due to the network-based attack vector and high confidentiality impact. 3. Implement network segmentation and access controls to limit potential exposure. 4. Monitor network traffic for suspicious activities that may indicate attempted exploitation. 5. Keep all Windows systems and software up to date with the latest security patches. 6. Consider using intrusion detection/prevention systems (IDS/IPS) to detect and block potential exploitation attempts.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Detection for the vulnerability has been added to Qualys (92149)
A CVSS base score of 7.5 has been assigned.
NVD published the first details for CVE-2024-38064
Feedly found the first article mentioning CVE-2024-38064. See article
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.09% (Percentile: 37.4%)
This CVE started to trend in security discussions
This CVE stopped trending in security discussions