CVE-2024-38067

Uncontrolled Resource Consumption (CWE-400)

Published: Jul 9, 2024

010
CVSS 7.5EPSS 0.05%High
CVE info copied to clipboard

Summary

A vulnerability in the Windows Online Certificate Status Protocol (OCSP) Server could allow an attacker to cause a Denial of Service condition. This vulnerability affects various versions of Windows Server, including 2008, 2012, 2016, 2019, 2022, and 2022 23H2. The vulnerability has a CVSS v3.1 base score of 7.5, which is considered "High" severity. The attack vector is network-based, requires low attack complexity, and does not need user interaction or privileges to exploit.

Impact

If successfully exploited, this vulnerability could lead to a high impact on the availability of the affected systems. An attacker could potentially disrupt the OCSP server's functionality, causing it to become unresponsive or crash. This could significantly impact certificate validation processes, potentially affecting secure communications and authentication mechanisms that rely on OCSP for real-time certificate status checking. However, there is no impact on the confidentiality or integrity of the system, as indicated by the CVSS metrics.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available for this vulnerability. Microsoft has released updates to address the issue. The patch was added on July 9, 2024, and is available through the Microsoft Update Guide. Specific version numbers for the patches are: Windows Server 2022 up to version 10.0.20348.2582, Windows Server 2016 up to version 10.0.14393.7159, Windows Server 2019 up to version 10.0.17763.6054, and Windows Server 2022 23H2 up to version 10.0.25398.1009.

Mitigation

To mitigate this vulnerability, it is strongly recommended to apply the security updates provided by Microsoft as soon as possible. Prioritize patching for Windows Server systems, especially those running OCSP services or exposed to untrusted networks. Additionally, consider implementing network segmentation and access controls to limit exposure of OCSP servers to potential attackers. Monitor OCSP server performance and set up alerts for unusual resource consumption or service disruptions. As a temporary measure, if immediate patching is not possible, consider implementing rate limiting or other traffic management techniques to protect OCSP servers from potential denial of service attacks.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92149)

Jul 9, 2024 at 7:53 AM
CVSS

A CVSS base score of 7.5 has been assigned.

Jul 9, 2024 at 5:05 PM / microsoft
CVE Assignment

NVD published the first details for CVE-2024-38067

Jul 9, 2024 at 5:15 PM
First Article

Feedly found the first article mentioning CVE-2024-38067. See article

Jul 9, 2024 at 5:17 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Jul 9, 2024 at 6:53 PM
EPSS

EPSS Score was set to: 0.05% (Percentile: 17.2%)

Jul 10, 2024 at 10:14 AM
Trending

This CVE started to trend in security discussions

Jul 12, 2024 at 9:32 AM
Trending

This CVE stopped trending in security discussions

Jul 12, 2024 at 10:08 AM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_server_2022_23h2
+null more

Patches

Microsoft
+null more

Attack Patterns

CAPEC-147: XML Ping of the Death
+null more

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:None
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI