Windows Kerberos Elevation of Privilege Vulnerability. This is a network-based vulnerability with low attack complexity and requires no user interaction. The vulnerability affects the confidentiality, integrity, and availability of the system, all with high impact. However, it requires high privileges to exploit and does not change the scope of the attack.
If successfully exploited, this vulnerability could allow an attacker with high privileges to elevate their privileges further within the Windows system. The high impact on confidentiality, integrity, and availability suggests that an attacker could potentially access sensitive information, modify system data, or disrupt system operations. Given that it's a network-based attack vector, it could potentially be exploited remotely, increasing the risk for organizations with exposed systems.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available for this vulnerability. Microsoft has released updates to address this issue across multiple versions of Windows, including Windows 10, Windows 11, and various Windows Server versions. Each affected version has a specific update available that should be applied to mitigate this vulnerability.
1. Apply the latest security updates provided by Microsoft for the affected Windows versions. 2. Ensure that only necessary accounts have high privileges, as the vulnerability requires high privileges to exploit. 3. Implement network segmentation and firewall rules to limit exposure of vulnerable systems. 4. Monitor for unusual activity related to Kerberos authentication and privilege escalation attempts. 5. Keep all Windows systems updated to the latest versions specified in the vulnerability details: - Windows Server 2016: Update to version 10.0.14393.7336 or later - Windows 10 (various versions): Update to the specified versions for each build - Windows 11 (various versions): Update to the specified versions for each build - Windows Server 2019: Update to version 10.0.17763.6293 or later - Windows Server 2022: Update to version 10.0.20348.2700 or later - For other affected versions, refer to the specific version numbers provided in the vulnerability data
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (92169)
A CVSS base score of 7.2 has been assigned.
Feedly found the first article mentioning CVE-2024-38239. See article
Feedly estimated the CVSS score as MEDIUM
NVD published the first details for CVE-2024-38239
Feedly estimated the CVSS score as HIGH
EPSS Score was set to: 0.05% (Percentile: 20%)
EPSS Score was set to: 0.05% (Percentile: 17.4%)