NULL Pointer Dereference (CWE-476)
Windows Layer-2 Bridge Network Driver is vulnerable to a Denial of Service attack. This vulnerability is caused by a NULL Pointer Dereference issue in the affected systems.
An attacker could exploit this vulnerability to cause a denial of service condition, potentially causing the affected Windows system to become unresponsive or crash. This could lead to temporary loss of service availability for users and systems relying on the affected Windows installations.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Patches are available. Microsoft has released updates to address this vulnerability for all affected Windows versions.
1. Apply the latest security updates provided by Microsoft for the affected Windows versions. 2. Prioritize patching based on the criticality of the systems and their exposure to potential attacks. 3. Monitor systems for any signs of exploitation or unusual behavior. 4. If immediate patching is not possible, consider implementing network segmentation to limit potential attack vectors. 5. Ensure that only trusted traffic is allowed to interact with the Layer-2 Bridge Network Driver.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (92160)
A CVSS base score of 7.5 has been assigned.
Feedly found the first article mentioning CVE-2024-38146. See article
Feedly estimated the CVSS score as MEDIUM
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-38146
EPSS Score was set to: 0.33% (Percentile: 71.8%)