Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
CVE-2024-38143
4.2MEDIUM
Key Information:
- Vendor
- Microsoft
- Status
- Vendor
- CVE Published:
- 13 August 2024
Badges
👾 Exploit Exists🟡 Public PoC
Summary
Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20751
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7259
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.6189
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Score:
4.2
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Physical
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved