Potential Elevation of Privilege Vulnerability in Windows Backup

CVE-2024-38202
7.3HIGH

Key Information

Vendor
Microsoft
Status
Windows 10 Version 1809
Windows Server 2019
Windows Server 2019 (server Core Installation)
Windows Server 2022
Vendor
CVE Published:
8 August 2024

Badges

đź‘ľ Exploit Existsđź“° News Worthy

Summary

The first article outlines a potential elevation of privilege vulnerability in Windows Backup, which could allow an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or bypass some features of Virtualization Based Security (VBS). Exploitation requires interaction by a privileged user, and Microsoft is currently working on a security update to mitigate the threat. There are no known attempts to exploit this vulnerability, but a public presentation of the vulnerability was hosted at BlackHat, and attendees are encouraged to follow Recommended Actions to protect their systems. The second article reveals that SafeBreach security researcher Alon Leviev discovered two zero-day vulnerabilities in Windows Update, which could be exploited in downgrade attacks to "unpatch" fully updated Windows 10, 11, and Server systems and reintroduce old vulnerabilities. These vulnerabilities have not yet received a security update from Microsoft, even though six months have passed since they were reported. The exploitation of these zero-day vulnerabilities could expose systems to thousands of past vulnerabilities and make the term "fully patched" meaningless on any Windows machine. There are observed attempts to exploit these vulnerabilities, making it crucial for users to upgrade to the fixed version as soon as it becomes available.

Affected Version(s)

Windows 10 Version 1809 < 10.0.17763.6414

Windows Server 2019 < 10.0.17763.6414

Windows Server 2019 (Server Core installation) < 10.0.17763.6414

News Articles

CVSS V3.1

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • đź‘ľ

    Exploit exists.

  • Vulnerability published.

  • First article discovered by BleepingComputer

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed9 News Article(s)
.