Out-of-bounds Read (CWE-125)
Windows Secure Channel Denial of Service Vulnerability. This is a network-based vulnerability with low attack complexity that requires no user interaction or privileges. It affects the availability of the system but does not impact confidentiality or integrity. The vulnerability is classified as an Out-of-bounds Read (CWE-125).
This vulnerability can be exploited to cause a Denial of Service (DoS) attack on the affected Windows systems. The attack can be initiated remotely over the network without requiring any user interaction or special privileges. If successfully exploited, it could lead to high availability impact, potentially causing system downtime or service interruptions. The vulnerability has a CVSS v3.1 base score of 7.5, indicating a high severity level.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Microsoft has released an official fix for this vulnerability on August 13, 2024. The patch addresses the vulnerability in multiple versions of Windows, including Windows 11 (versions 21H2, 22H2, 23H2, and 24H2) and Windows Server 2022 (including version 23H2). Specific version numbers that should be patched to are: - Windows 11 24H2: 10.0.26100.1457 or later - Windows 11 23H2: 10.0.22631.4037 or later - Windows 11 22H2: 10.0.22621.4037 or later - Windows 11 21H2: 10.0.22000.3147 or later - Windows Server 2022: 10.0.20348.2655 or later - Windows Server 2022 23H2: 10.0.25398.1085 or later
1. Apply the official patch released by Microsoft as soon as possible. 2. Implement network segmentation to limit exposure of vulnerable systems. 3. Monitor for unusual network activity or signs of DoS attacks. 4. Ensure all Windows systems are up-to-date with the latest security updates. 5. Consider implementing additional network security measures such as intrusion detection/prevention systems (IDS/IPS) to help detect and mitigate potential attacks.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (92160)
Feedly found the first article mentioning CVE-2024-38148. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-38148
CVE-2024-38148 is a critical vulnerability with a CVSS score of 7.5 affecting the Windows Transport Security Layer (TLS). It is currently being exploited in the wild by threat actors, and there are proof-of-concept exploits available. Mitigations, detections, and patches are not yet available, leading to potential downstream impacts on other third-party vendors and technologies relying on Windows TLS. See article
EPSS Score was set to: 0.09% (Percentile: 39.6%)