CVE-2024-38105

Improper Input Validation (CWE-20)

Published: Jul 9, 2024

010
CVSS 6.5EPSS 0.04%Medium
CVE info copied to clipboard

Summary

A vulnerability in the Windows Layer-2 Bridge Network Driver could allow an attacker to cause a Denial of Service condition. This issue is classified as a Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability and is associated with improper input validation (CWE-20). The vulnerability has a CVSS v3.1 base score of 6.5, categorizing it as a medium severity issue.

Impact

An attacker exploiting this vulnerability could cause a Denial of Service condition, potentially disrupting the availability of the affected system. The attack vector is adjacent network, meaning the attacker would need to be on the same network segment as the target. The vulnerability requires no user interaction and no privileges to exploit. While there is no impact on confidentiality or integrity, the availability impact is rated as high.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Microsoft released a security update to address this vulnerability on July 9, 2024. It is strongly recommended to apply this patch as soon as possible to mitigate the risk.

Mitigation

1. Apply the security update provided by Microsoft as soon as possible. 2. Implement network segmentation to limit the potential attack surface. 3. Monitor for unusual network activity, particularly from adjacent network segments. 4. Ensure that only trusted devices are allowed on the same network segment as critical systems. 5. Implement robust input validation mechanisms across all network interfaces.

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92149)

Jul 9, 2024 at 7:53 AM
CVSS

A CVSS base score of 6.5 has been assigned.

Jul 9, 2024 at 5:05 PM / microsoft
CVE Assignment

NVD published the first details for CVE-2024-38105

Jul 9, 2024 at 5:15 PM
First Article

Feedly found the first article mentioning CVE-2024-38105. See article

Jul 9, 2024 at 5:17 PM / Vulners.com RSS Feed
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Jul 9, 2024 at 5:36 PM
Trending

This CVE started to trend in security discussions

Jul 9, 2024 at 8:00 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 13%)

Jul 10, 2024 at 10:14 AM
Trending

This CVE stopped trending in security discussions

Jul 11, 2024 at 6:55 AM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_10_1507
+null more

Patches

Microsoft
+null more

Links to Mitre Att&cks

T1562.003: Impair Command History Logging
+null more

Attack Patterns

CAPEC-10: Buffer Overflow via Environment Variables
+null more

News

Xerox Security Bulletin XRX24- 013 for Xerox® FreeFlow® Print Server v2 / Windows® 10
The methods of Security Patch Update delivery and install are over the network using FreeFlow® Print Server Update Manager or directly from Microsoft® using Windows® Update service, and using media (i.e., USB). The FreeFlow® Print Server engineering team receives new patch updates in January, April, July, and October, and will test them for supported Printer products (such as iGen®5 printers) prior to delivery for customer install.
Windows Layer-2 Bridge Network Driver Denial of Service VulnerabilityWindows ...
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
[Cyware] Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days
Summary: This content highlights the latest vulnerabilities and their severity in various Microsoft products, including .NET and Visual Studio, Active Directory Rights Management Services, Azure CycleCloud, and Azure DevOps. Threat …
Microsoft Enhances Windows 11 24H2 Copilot+ PCs in July Patch Tuesday
Windows Graphics Component Remote Code Execution Vulnerability Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability
Microsoft July 2024 Patch Tuesday Fixes 142 Flaws, 4 Zero-Days
As part of Microsoft's July 2024 Patch Tuesday, 142 flaws were addressed, including two zero-days actively exploited and two publicly disclosed. Five critical vulnerabilities were fixed, all related to remote code execution.
See 17 more articles and social media posts

CVSS V3.1

Attack Vector:Adjacent_network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:None
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI