CVE ID
CVE-2024-38193
Vulnerability Name
Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
- Project: Microsoft
- Product: Windows
Date
- Date Added: 2024-08-13
- Due Date: 2024-09-03
Description
Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.
Known To Be Used in Ransomware Campaigns?
Unknown
Action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Additional Notes
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193; https://nvd.nist.gov/vuln/detail/CVE-2024-38193
Related Security News
- Kimsuky Spreads DocSwap Android Malware via QR Phishing Posing as Delivery App
- Microsoft Fixes 78 Flaws, 5 Zero-Days Exploited; CVSS 10 Bug Impacts Azure DevOps Server
- Microsoft's Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation
- North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day Exploit
- North Korean hackers exploit Chrome zero-day to deploy rootkit
- 0-day in Windows driver exploited by North Korean hackers to deliver rootkit (CVE-2024-38193)
- Windows driver zero-day exploited by Lazarus hackers to install rootkit
- Microsoft Patches Zero-Day Flaw Exploited by North Korea’s Lazarus Group
- Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Days
- Microsoft Issues Patches for 90 Flaws, Including 10 Critical Zero-Day Exploits
Top comments (0)