CVE-2024-43629

Untrusted Pointer Dereference (CWE-822)

Published: Nov 12, 2024

010
CVSS 7.8EPSS 0.04%High
CVE info copied to clipboard

Summary

Windows DWM Core Library Elevation of Privilege Vulnerability. This is a local vulnerability with a low attack complexity and low privileges required. It has high impacts on confidentiality, integrity, and availability. The vulnerability is associated with an Untrusted Pointer Dereference (CWE-822) and Pointer Manipulation (CAPEC-129).

Impact

This vulnerability could allow an attacker with low privileges to elevate their privileges on a local system. The high impact on confidentiality, integrity, and availability suggests that an attacker could potentially gain full control over the affected system, access sensitive information, modify system files, and disrupt normal operations. Given the local attack vector, an attacker would need initial access to the system to exploit this vulnerability.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Microsoft released an official fix on November 12, 2024. Security teams should prioritize applying this patch to affected systems.

Mitigation

1. Apply the official patch released by Microsoft as soon as possible. 2. Limit user privileges on systems to reduce the potential impact of successful exploitation. 3. Monitor for suspicious activities that might indicate attempts to exploit this vulnerability. 4. Ensure that only trusted users have local access to sensitive systems.

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92186)

Nov 12, 2024 at 7:53 AM
First Article

Feedly found the first article mentioning CVE-2024-43629. See article

Nov 12, 2024 at 6:00 PM / Microsoft Security Advisories - MSRC
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Nov 12, 2024 at 6:01 PM
CVE Assignment

NVD published the first details for CVE-2024-43629

Nov 12, 2024 at 6:15 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 10.1%)

Nov 13, 2024 at 5:05 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 10.2%)

Nov 18, 2024 at 6:50 PM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_server_2025
+null more

Patches

Microsoft
+null more

Attack Patterns

CAPEC-129: Pointer Manipulation
+null more

References

Windows DWM Core Library Elevation of Privilege Vulnerability
What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.

News

2024-45 - Adobe, Mozilla, Canonical, Red Hat, Microsoft, Google, Jenkins, GitHub, Spring 🗂️
Advisory Week Week 45, 2024 National Cyber Awareness System CISA Releases Nineteen Industrial Control Systems Advisories CISA Adds Two Known Exploited Vulnerabilities to Catalog Palo Alto Networks Emphasizes Hardening Guidance Fortinet Releases Security Updates for Multiple Products Microsoft Releases November 2024 Security Updates Adobe Releases Security Updates for Multiple Products Ivanti Releases Security Updates for Multiple Products JCDC’s Collaborative Efforts Enhance Cybersecurity for the 2024 Olympic and Paralympic Games Citrix Releases Security Updates for NetScaler and Citrix Session Recording CISA Releases Five Industrial Control Systems Advisories CISA, FBI, NSA, and International Partners Release Joint Advisory on 2023 Top Routinely Exploited Vulnerabilities CISA Adds Five Known Exploited Vulnerabilities to Catalog Adobe Security Bulletins and Advisories Security updates available for Adobe Photoshop APSB24-89 Security Updates Available for Adobe Commerce APSB24-90 Security Updates Available for Adobe Illustrator APSB24-66 APSB24-87 Security Update Available for Adobe InDesign APSB24-88 Security Updates Available for Adobe Bridge APSB24-77 Security Updates Available for Adobe Audition APSB24-83 Mozilla Security Advisories Security Vulnerabilities fixed in Thunderbird 132.0.1 mfsa2024-62 Security Vulnerabilities fixed in Thunderbird 128.4.3 mfsa2024-61 Ubuntu Security Notices Linux kernel vulnerabilities: USN-7089-6 / USN-7088-5 / USN-7089-5 / USN-7110-1 / USN-7089-4 / USN-7100-2 / USN-7100-1 GD Graphics Library vulnerability: USN-7112-1 Go vulnerabilities: USN-7111-1 / USN-7109-1 Linux kernel vulnerability:
Microsoft’s Security Update in November on High-Risk Vulnerabilities in Multiple Products
On November 13, NSFOCUS CERT detected that Microsoft released a security update patch for November, which fixed 89 security issues, including Windows, Microsoft SQL Server, Microsoft Office, Azure, Open Source Software, Microsoft Visual Studio, System Center and other widely used products, including high-risk vulnerabilities such as privilege escalation vulnerability and remote code execution vulnerability. Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Users Urged to Patch Critical Security Flaw (CVE-2024-43629)
Microsoft has released updates for several Windows products, addressing the CVE-2024-43629 vulnerability identified by a Positive Technologies security expert. Exploiting this vulnerability could enable attackers to elevate user privileges to system level.
Positive Technologies helps resolve zero-day vulnerability in Windows
Microsoft released an update for a range of Windows products to resolve the CVE-2024-43629 vulnerability discovered by Sergey Tarasov from the Positive Technologies Expert Security Centre (PT ESC). In 2017, the PT Expert Security Centre team discovered and helped Microsoft resolve a similar vulnerability ( CVE-2017-0263 ) in the current and previous versions of Windows 10.
8 - CVE-2024-43629
Currently trending CVE - hypeScore: 2 - Windows DWM Core Library Elevation of Privilege Vulnerability
See 44 more articles and social media posts

CVSS V3.1

Attack Vector:Local
Attack Complexity:Low
Privileges Required:Low
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI