Windows Wi-Fi Driver Remote Code Execution Vulnerability

CVE-2024-30078
8.8HIGH

Key Information

Vendor
Microsoft
Status
Windows 10 Version 1809
Windows Server 2019
Windows Server 2019 (server Core Installation)
Windows Server 2022
Vendor
CVE Published:
11 June 2024

Badges

🔥 No. 1 Trending😄 Trended👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The vulnerability CVE-2024-30078 is a critical security flaw in the Windows Wi-Fi driver that allows for remote code execution by an unauthenticated attacker, without the need for any user interaction. It affects all supported versions of the Windows operating system and has a severity rating of 8.8 out of 10. The exploitation of this vulnerability can potentially bypass network-based detections and mitigations, making it an immediate patch priority. Microsoft has released a security update to address this issue, and users are advised to apply the latest patches as soon as possible to protect against potential attacks, especially in endpoint-dense environments such as hotels or trade shows.

Affected Version(s)

Windows 10 Version 1809 < 10.0.17763.5936

Windows Server 2019 < 10.0.17763.5936

Windows Server 2019 (Server Core installation) < 10.0.17763.5936

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit exists.

  • 🔥

    Vulnerability reached the number 1 worldwide trending spot.

  • Vulnerability started trending.

  • First article discovered by GBHackers on Security

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed1 Proof of Concept(s)9 News Article(s)
.