Memory Corruption Vulnerability in Scripting Engine Could Allow for Code Execution

CVE-2024-38178
7.5HIGH

Key Information

Vendor
Microsoft
Status
Windows 11 Version 24h2
Windows 10 Version 1809
Windows Server 2019
Windows Server 2019 (server Core Installation)
Vendor
CVE Published:
13 August 2024

Badges

😄 Trended👾 Exploit Exists📰 News Worthy

Summary

The article discusses a memory corruption vulnerability in the Scripting Engine that affects Microsoft software. The vulnerability, identified as CVE-2024-38178, has been exploited by the North Korean threat actor, ScarCruft, to spread RokRAT malware. Successful exploitation requires a user to click on a specially crafted URL, and the threat actors have used compromised advertising content to deliver the exploit. RokRAT is capable of various malicious activities, including remote access and data gathering. Microsoft has released patches to address this vulnerability, and the Cybersecurity and Infrastructure Security Agency (CISA) has added it to the Known Exploited Vulnerabilities Catalog, urging users to update their systems by September 3. The article also highlights four other zero-day vulnerabilities affecting Windows systems and emphasizes the importance of patching to mitigate the risk of cyber attacks exploiting known vulnerabilities.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2024-38178 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Windows 11 Version 24H2 < 10.0.26100.1457

Windows 10 Version 1809 < 10.0.17763.6189

Windows Server 2019 < 10.0.17763.6189

News Articles

EPSS Score

1% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability started trending.

  • 👾

    Exploit exists.

  • First article discovered by Forbes

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre DatabaseCISA DatabaseMicrosoft Feed3 News Article(s)
.