CVE-2024-38079

Heap-based Buffer Overflow (CWE-122)

Published: Jul 9, 2024

010
CVSS 7.8EPSS 0.04%High
CVE info copied to clipboard

Summary

Windows Graphics Component Elevation of Privilege Vulnerability. This is a heap-based buffer overflow vulnerability in the Windows Graphics Component that could allow an attacker to elevate their privileges on the system. The vulnerability has a CVSS v3.1 base score of 7.8, indicating a high severity. It requires local access and low privileges to exploit, with no user interaction needed.

Impact

If successfully exploited, this vulnerability could allow an attacker with low privileges to gain high-level access to the affected system. The potential impacts are severe, with high confidentiality, integrity, and availability impacts. An attacker could potentially execute arbitrary code with elevated privileges, manipulate or delete sensitive data, or disrupt system operations. This could lead to complete compromise of the affected Windows system.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available for this vulnerability. Microsoft released the patch on July 9, 2024. Security teams should prioritize applying this patch to affected systems as soon as possible.

Mitigation

1. Apply the security update provided by Microsoft immediately. This is the most effective mitigation. 2. Limit local access to systems and enforce the principle of least privilege to reduce the risk of exploitation. 3. Monitor for suspicious activities, especially attempts to elevate privileges on Windows systems. 4. Keep Windows systems and graphics components up to date with the latest security patches. 5. Implement network segmentation to limit the potential spread if a system is compromised. 6. Use endpoint detection and response (EDR) tools to detect and respond to potential exploitation attempts.

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92149)

Jul 9, 2024 at 7:53 AM
CVSS

A CVSS base score of 7.8 has been assigned.

Jul 9, 2024 at 5:05 PM / microsoft
CVE Assignment

NVD published the first details for CVE-2024-38079

Jul 9, 2024 at 5:15 PM
First Article

Feedly found the first article mentioning CVE-2024-38079. See article

Jul 9, 2024 at 5:17 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Jul 9, 2024 at 5:36 PM
Trending

This CVE started to trend in security discussions

Jul 9, 2024 at 6:59 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.2%)

Jul 10, 2024 at 10:14 AM
Trending

This CVE stopped trending in security discussions

Jul 12, 2024 at 6:40 PM
Threat Intelligence Report

CVE-2024-38079 is a vulnerability in the Microsoft Graphics Component with a CVSS score of 7.8, indicating a high level of criticality. The provided information does not specify whether it is being exploited in the wild, nor does it mention any proof-of-concept exploits, mitigations, detections, patches, or downstream impacts on third-party vendors or technology. Further investigation would be necessary to gather more details on these aspects. See article

Oct 27, 2024 at 2:07 AM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_server_2022_23h2
+null more

Patches

Microsoft
+null more

Attack Patterns

CAPEC-92: Forced Integer Overflow
+null more

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI