Heap-based Buffer Overflow (CWE-122)
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability. This is a local privilege escalation vulnerability affecting the Kernel Streaming WOW Thunk Service Driver. The vulnerability has a CVSS base score of 7.8, indicating a high severity. It requires low privileges and no user interaction to exploit, with a low attack complexity.
If exploited, this vulnerability could allow an attacker with low privileges to elevate their privileges on the affected system. The impact is severe, with potential for high confidentiality, integrity, and availability impacts. This means an attacker could potentially gain full control of the affected system, access sensitive information, modify critical data, or disrupt system operations.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Microsoft has released an official fix for this vulnerability on September 10, 2024.
1. Apply the official patch released by Microsoft as soon as possible. 2. Implement the principle of least privilege to minimize the potential impact of successful exploits. 3. Monitor for suspicious activities or unauthorized privilege escalations on affected systems. 4. Keep all systems and software up to date with the latest security patches. 5. Consider implementing additional access controls and network segmentation to limit the potential spread of an attack.
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (92169)
Feedly found the first article mentioning CVE-2024-38237. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-38237
EPSS Score was set to: 0.04% (Percentile: 9.6%)
EPSS Score was set to: 0.05% (Percentile: 19%)