CVE-2024-43625

Use After Free (CWE-416)

Published: Nov 12, 2024

010
CVSS 8.1EPSS 0.05%High
CVE info copied to clipboard

Summary

Microsoft Windows VMSwitch Elevation of Privilege Vulnerability. This vulnerability allows an attacker with local access to potentially gain elevated privileges on a system. The attack complexity is high, but it requires no user interaction or special privileges to exploit. The vulnerability is associated with a Use After Free (CWE-416) weakness.

Impact

If successfully exploited, this vulnerability could lead to a significant security breach. The attacker could gain high-level access to confidential information, manipulate system data, and potentially disrupt system availability. The scope is changed, indicating that the vulnerability may affect resources beyond its original security context. The vulnerability has high impact on confidentiality, integrity, and availability.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Microsoft has released an official fix for this vulnerability as of November 12, 2024.

Mitigation

1. Apply the official patch released by Microsoft as soon as possible. 2. Limit local access to systems, especially those running Windows with VMSwitch. 3. Implement the principle of least privilege to minimize potential impact. 4. Monitor systems for unusual activity, particularly any attempts at privilege escalation. 5. Keep all Windows systems and components up to date with the latest security updates.

CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92186)

Nov 12, 2024 at 7:53 AM
CVSS

A CVSS base score of 8.1 has been assigned.

Nov 12, 2024 at 5:55 PM / microsoft
First Article

Feedly found the first article mentioning CVE-2024-43625. See article

Nov 12, 2024 at 6:00 PM / Microsoft Security Advisories - MSRC
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Nov 12, 2024 at 6:01 PM
CVE Assignment

NVD published the first details for CVE-2024-43625

Nov 12, 2024 at 6:15 PM
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 12, 2024 at 6:36 PM
EPSS

EPSS Score was set to: 0.05% (Percentile: 22.9%)

Nov 13, 2024 at 5:06 PM
Threat Intelligence Report

CVE-2024-43625 is a critical elevation of privilege vulnerability in Microsoft Windows VMSwitch, which could allow an attacker to gain elevated access to system resources. The details regarding its CVSS score, exploitation in the wild, proof-of-concept exploits, mitigations, detections, patches, or downstream impacts on third-party vendors are not provided in the available information. Further investigation is necessary to assess the full implications and available defenses against this vulnerability. See article

Nov 14, 2024 at 6:08 AM
EPSS

EPSS Score was set to: 0.06% (Percentile: 28.9%)

Nov 18, 2024 at 6:47 PM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_11_24h2
+null more

Patches

Microsoft
+null more

References

Microsoft Windows VMSwitch Elevation of Privilege Vulnerability
In this case, a successful attack could be performed from a low privilege Hyper-V guest. What privileges could be gained by an attacker who successfully exploited this vulnerability?
ION Advisory: November Patch Tuesday
None of the following critical vulnerabilities below have been reported as being actively exploited or publicly disclosed: The following vulnerabilities have been reported as publicly disclosed, but not yet actively exploited :

News

2024-45 - Adobe, Mozilla, Canonical, Red Hat, Microsoft, Google, Jenkins, GitHub, Spring 🗂️
Advisory Week Week 45, 2024 National Cyber Awareness System CISA Releases Nineteen Industrial Control Systems Advisories CISA Adds Two Known Exploited Vulnerabilities to Catalog Palo Alto Networks Emphasizes Hardening Guidance Fortinet Releases Security Updates for Multiple Products Microsoft Releases November 2024 Security Updates Adobe Releases Security Updates for Multiple Products Ivanti Releases Security Updates for Multiple Products JCDC’s Collaborative Efforts Enhance Cybersecurity for the 2024 Olympic and Paralympic Games Citrix Releases Security Updates for NetScaler and Citrix Session Recording CISA Releases Five Industrial Control Systems Advisories CISA, FBI, NSA, and International Partners Release Joint Advisory on 2023 Top Routinely Exploited Vulnerabilities CISA Adds Five Known Exploited Vulnerabilities to Catalog Adobe Security Bulletins and Advisories Security updates available for Adobe Photoshop APSB24-89 Security Updates Available for Adobe Commerce APSB24-90 Security Updates Available for Adobe Illustrator APSB24-66 APSB24-87 Security Update Available for Adobe InDesign APSB24-88 Security Updates Available for Adobe Bridge APSB24-77 Security Updates Available for Adobe Audition APSB24-83 Mozilla Security Advisories Security Vulnerabilities fixed in Thunderbird 132.0.1 mfsa2024-62 Security Vulnerabilities fixed in Thunderbird 128.4.3 mfsa2024-61 Ubuntu Security Notices Linux kernel vulnerabilities: USN-7089-6 / USN-7088-5 / USN-7089-5 / USN-7110-1 / USN-7089-4 / USN-7100-2 / USN-7100-1 GD Graphics Library vulnerability: USN-7112-1 Go vulnerabilities: USN-7111-1 / USN-7109-1 Linux kernel vulnerability:
Security & Threat Updates – November 2024:
Microsoft addressed 89 Common Vulnerabilities and Exposures (CVE’s) this month, 6 which were marked as zero-day vulnerabilities. The most critical Common Vulnerabilities and Exposures (CVE’s) are noted below:
For November, Patch Tuesday includes three Windows zero-day fixes
Microsoft’s November Patch Tuesday release addresses 89 vulnerabilities in Windows, SQL Server, .NET and Microsoft Office — and three zero-day vulnerabilities ( CVE-2024-43451, CVE-2024-49019 and CVE-2024-49039 ) that mean a patch now recommendation for Windows platforms. Before you apply this Exchange Server update, we highly recommend a review of the reported header detection issues and mitigating factors.
Microsoft Released November 2024 Patch Tuesday With ~90 Fixes - Latest Hacking News
With November Patch Tuesday, Microsoft addressed multiple serious vulnerabilities, including some publicly known and actively exploited flaws, affecting different services. CVE-2024-49039 (important; CVSS 8.8): A privilege escalation vulnerability in Windows Task Scheduler that was attacked before a fix could arrive.
Microsoft’s Security Update in November on High-Risk Vulnerabilities in Multiple Products
On November 13, NSFOCUS CERT detected that Microsoft released a security update patch for November, which fixed 89 security issues, including Windows, Microsoft SQL Server, Microsoft Office, Azure, Open Source Software, Microsoft Visual Studio, System Center and other widely used products, including high-risk vulnerabilities such as privilege escalation vulnerability and remote code execution vulnerability. Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
See 51 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:High
Privileges Required:None
User Interaction:None
Scope:Changed
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI