Windows TCP/IP Remote Code Execution Vulnerability

CVE-2024-38063

9.8CRITICAL

Key Information

Vendor
Microsoft
Status
Windows 10 Version 1809
Windows Server 2019
Windows Server 2019 (server Core Installation)
Windows Server 2022
Vendor
CVE Published:
13 August 2024

Badges

πŸ”₯ No. 1 TrendingπŸ˜„ TrendedπŸ‘Ύ Exploit ExistsπŸ”΄ Public PoCπŸ“° News Worthy

What is CVE-2024-38063?

CVE-2024-38063 is a critical vulnerability affecting the Windows operating system's TCP/IP stack, which is fundamental for network communication. This vulnerability allows for remote code execution, meaning that an attacker can execute arbitrary code on a target system without authentication. This flaw poses a significant risk for organizations, as it can lead to unauthorized access and control over affected systems, potentially resulting in severe data breaches and operational disruptions.

Technical Details

This vulnerability arises specifically within the TCP/IP component of Windows, which manages how data is transmitted over the network. The root cause involves inadequate input validation, which could be exploited by crafting malicious packets sent to a vulnerable system. If exploited, the attacker could gain full control of the operating system, manipulate data, or install malicious software. The severity of this flaw is underscored by its likely discoverability and the potential availability of exploit code in underground forums.

Impact of the Vulnerability

  1. Unauthorized Remote Control: Successful exploitation allows attackers to gain remote access, leading to unauthorized control of the system, which can facilitate further attacks and data exfiltration.

  2. Data Breaches: Attackers could harvest sensitive information from compromised systems, including personal data, financial information, and proprietary business information, leading to significant reputational damage and financial loss.

  3. Malware Deployment: The vulnerability may enable attackers to deploy ransomware or other malicious software, encrypting critical data and demanding a ransom, further exacerbating the organization's security challenges.

Affected Version(s)

Windows 10 Version 1809 < 10.0.17763.6293

Windows Server 2019 < 10.0.17763.6293

Windows Server 2019 (Server Core installation) < 10.0.17763.6293

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

PoCcode released for zero-click Windows critical vuln

Windows users who haven't yet installed the latest fixes to their operating systems will need to get a move on, as code now exists to exploit a critical Microsoft vulnerability announced by Redmond two weeks...

4 months ago

PoC Exploit for Zero-Click Vulnerability Made Available to the Masses

The exploit can be accessed on GitHub and makes it easier for the flaw to be exploited by threat actors.

4 months ago

Microsoft Patched A Zero-Click TCP/IP RCE Flaw

The zero-click TCP/IP Flaw affects Microsoft Windows systems with IPv6 enabled, leaving the ones with disabled IPv6 unaffected.

4 months ago

Refferences

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ”΄

    Public PoC available

  • πŸ”₯

    Vulnerability reached the number 1 worldwide trending spot

  • Vulnerability started trending

  • πŸ‘Ύ

    Exploit known to exist

  • First article discovered by The Register

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed17 Proof of Concept(s)11 News Article(s)
.