Windows Registry Service Elevation of Privilege Vulnerability
CVE-2024-43532
Key Information:
- Vendor
- Microsoft
- Status
- Vendor
- CVE Published:
- 8 October 2024
Badges
Summary
The vulnerability identified as CVE-2024-43532 affects the Windows Registry service, allowing for an elevation of privilege. Exploit code for this vulnerability has been made public, and it enables attackers to take control of a Windows domain by downgrading the security of the authentication process. This flaw affects multiple versions of Windows server software, as well as Windows 10 and 11. Exploiting CVE-2024-43532 could lead to the creation of new domain administrator accounts, and it has been used in a NTLM relay attack by threat actors, including the LockFile ransomware gang. The vulnerability was initially reported to Microsoft in February, with a fix released three months later. The release of a working proof-of-concept and exploitation process demonstrates the potential severity of this vulnerability, highlighting the need for vigilance and mitigation efforts.
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20796
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7428
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.6414
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
Exploit released for new Windows Server "WinReg" NTLM Relay attack
Proof-of-concept exploit code is now public for a vulnerability in Microsoft's Remote Registry client that could be used to take control of a Windows domain by downgrading the security of the authentication process.
3 months ago
Windows Remote Registry Client EoP Flaw Exposes Systems to Relay Attacks
A critical elevation of privilege (EoP) vulnerability, identified as CVE-2024-43532, has been discovered in the Windows Remote Registry client. This vulnerability potentially allows attackers to relay NTLM authentication and gain unauthorized access to Windows systems.
3 months ago
References
CVSS V3.1
Timeline
- 👾
Exploit known to exist
- 📰
First article discovered by CyberSecurityNews
Vulnerability published
Vulnerability Reserved