Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

msrc логотип

CVE-2024-38159

Опубликовано: 13 авг. 2024
Источник: msrc
CVSS3: 9.1
EPSS Низкий

Описание

Windows Network Virtualization Remote Code Execution Vulnerability

Меры по смягчению последствий

The following mitigating factors might be helpful in your situation:

  • Ensuring that the virtual machine (VM) is running on the VMware hypervisor exclusively, as it needs to be capable of nested virtualization.
  • Disabling Hyper-V and its dependent features (VBS and its components) on the host where the VM will run is also crucial.
  • Renaming the hypervisor binary (C:\Windows\System32\hvix64.exe) to prevent it from loading at boot time can also help mitigate the issue.

FAQ

According to the CVSS metric, privileges required is high (PR:H). What does that mean for this vulnerability?

To successfully exploit this vulnerability, an attacker or the targeted user would need to achieve a high level of control over a machine, as the attack requires access to processes typically restricted from average users.

Essentially, the exploitation necessitates elevated privileges on the compromised machine due to the requirement of manipulating processes beyond the reach of standard user permissions.

How could an attacker exploit this vulnerability?

An attacker could exploit the vulnerability by taking advantage of the unchecked return value in the wnv.sys component of Windows Server 2016. By manipulating the content of the Memory Descriptor List (MDL), the attacker could cause unauthorized memory writes or even free a valid block currently in use, leading to a critical guest-to-host escape.

According to the CVSS metric, successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?

This vulnerability could lead to the attacker gaining the ability to interact with other tenant’s applications and content.

Обновления

ПродуктСтатьяОбновление
Windows Server 2016
Windows 10 Version 1607 for 32-bit Systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2016 (Server Core installation)

Показывать по

Возможность эксплуатации

Publicly Disclosed

No

Exploited

No

Latest Software Release

Exploitation Less Likely

DOS

N/A

EPSS

Процентиль: 85%
0.02777
Низкий

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
nvd
10 месяцев назад

Windows Network Virtualization Remote Code Execution Vulnerability

CVSS3: 9.1
github
10 месяцев назад

Windows Network Virtualization Remote Code Execution Vulnerability

CVSS3: 9.1
fstec
10 месяцев назад

Уязвимость службы Windows Network Virtualization операционных систем Windows, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 85%
0.02777
Низкий

9.1 Critical

CVSS3