7.8

CVE-2024-21338

Warning
Exploit

Windows Kernel Elevation of Privilege Vulnerability

Data is provided by the National Vulnerability Database (NVD)
MicrosoftWindows 10 1809 Version < 10.0.17763.5458
MicrosoftWindows 10 21h2 Version < 10.0.19044.4046
MicrosoftWindows 10 22h2 Version < 10.0.19045.4046
MicrosoftWindows 11 21h2 Version < 10.0.22000.2777
MicrosoftWindows 11 22h2 Version < 10.0.22621.3155
MicrosoftWindows 11 23h2 Version < 10.0.22631.3155
MicrosoftWindows Server 2019 Version < 10.0.17763.5458
MicrosoftWindows Server 2022 Version < 10.0.20348.2322
MicrosoftWindows Server 2022 23h2 Version <= 10.0.25398.709

04.03.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Microsoft Windows Kernel Exposed IOCTL with Insufficient Access Control Vulnerability

Vulnerability

Microsoft Windows Kernel contains an exposed IOCTL with insufficient access control vulnerability within the IOCTL (input and output control) dispatcher in appid.sys that allows a local attacker to achieve privilege escalation.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 78.05% 0.99
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
secure@microsoft.com 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-822 Untrusted Pointer Dereference

The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.