7.8
CVSSv3

CVE-2024-21338

Published: 13/02/2024 Updated: 11/04/2024
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 0

Vulnerability Summary

Windows Kernel Elevation of Privilege Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows 11 23h2

microsoft windows 10 22h2

microsoft windows 11 22h2

microsoft windows 10 21h2

microsoft windows 11 21h2

microsoft windows server 2022

microsoft windows server 2019

microsoft windows 10 1809

microsoft windows server 2022 23h2

Vendor Advisories

Check Point Reference: CPAI-2024-0029 Date Published: 13 Feb 2024 Severity: High ...

Exploits

Microsoft Windows version 100177635458 kernel IOCTL privilege escalation exploit ...

Github Repositories

CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability Zero-day

CVE-2024-21338 Windows Kernel Elevation of Privilege Vulnerability Zero-day USAGE python exploitpy C:\Windows\System32\drivers\appidsys -g NewAdminsGroupName -u NewUserAdminName -p NewUserAdminPassword

CVE-2024-21338 Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled Compiling Use Microsoft Visual Studio with the C++ package to successfully compile the PoC on both Release and Debug modes Post Original blog post: hakaisecurityio/cve-2024-21338-from-admin-to-kernel-through-token-manipulatio

PoC for the Untrusted Pointer Dereference in the appid.sys driver

CVE-2024-21338 PoC for the Untrusted Pointer Dereference in the appidsys driver

Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.

CVE-2024-21338 Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled

CVE-2024-21338 Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled

Recent Articles

Windows Kernel bug fixed last month exploited as zero-day since August
BleepingComputer • Sergiu Gatlan • 02 Mar 2024

Windows Kernel bug fixed last month exploited as zero-day since August By Sergiu Gatlan March 2, 2024 10:09 AM 0 Microsoft patched a high-severity Windows Kernel privilege escalation vulnerability in February, six months after being informed that the flaw was being exploited as a zero-day. Tracked as CVE-2024-21338, the security flaw was found by Avast Senior Malware Researcher Jan Vojtěšek in the appid.sys Windows AppLocker driver and reported to Microsoft last August as an actively expl...

Lazarus hackers exploited Windows zero-day to gain Kernel privileges
BleepingComputer • Bill Toulas • 28 Feb 2024

Lazarus hackers exploited Windows zero-day to gain Kernel privileges By Bill Toulas February 28, 2024 12:24 PM 1 North Korean threat actors known as the Lazarus Group exploited a flaw in the Windows AppLocker driver (appid.sys) as a zero-day to gain kernel-level access and turn off security tools, allowing them to bypass noisy BYOVD (Bring Your Own Vulnerable Driver) techniques. This activity was detected by Avast analysts, who promptly reported it to Microsoft, leading to a fix for the flaw, no...

Microsoft waited 6 months to patch actively exploited admin-to-kernel vulnerability
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources PLUS: NSA shares cloud security tips; Infosec training for Jordanian women; Critical vulnerabilities

Infosec in brief Cybersecurity researchers informed Microsoft that Notorious North Korean hackers Lazarus Group discovered the "holy grail" of rootkit vulnerabilities in Windows last year, but Redmond still took six months to patch the problem. Researchers at Avast said they informed Microsoft of a serious admin-to-kernel exploit in a driver associated with AppLocker, the app for whitelisting software built into Windows, in August of last year. The vulnerability, found in the input/output contro...