Improper Handling of Missing Special Element (CWE-166)
Microsoft WS-Discovery Denial of Service Vulnerability. This vulnerability is related to improper handling of missing special elements and improper input validation in Microsoft's WS-Discovery implementation. The vulnerability affects multiple versions of Windows operating systems, including Windows Server and Windows 10/11.
This vulnerability allows for a network-based attack that can lead to a denial of service condition. The attack requires no user interaction and can be executed with low attack complexity. While it does not impact the confidentiality or integrity of the system, it has a high impact on the availability of the affected service. This could potentially disrupt critical services relying on WS-Discovery, affecting business operations and system accessibility.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Microsoft released the patch on July 9, 2024. Security teams should prioritize applying this patch to affected systems, particularly those exposed to untrusted networks.
Apply the latest security updates provided by Microsoft. Implement network segmentation and access controls to limit exposure of vulnerable systems. Monitor for unusual network traffic patterns that might indicate exploitation attempts. For systems that cannot be immediately patched, consider temporarily disabling the WS-Discovery service if it's not critical for operations.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Detection for the vulnerability has been added to Qualys (92149)
A CVSS base score of 7.5 has been assigned.
NVD published the first details for CVE-2024-38091
Feedly found the first article mentioning CVE-2024-38091. See article
Feedly estimated the CVSS score as MEDIUM
This CVE started to trend in security discussions
EPSS Score was set to: 0.05% (Percentile: 17.2%)
This CVE stopped trending in security discussions