CVE-2024-38193 - Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
Project:Microsoft
Product:Windows
Date Added:2024-08-13Due Date:2024-09-03
Vulnerability Name
Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
Description
Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.
Known To Be Used in Ransomware Campaigns?
Unknown
Action
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Additional Notes
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193
https://nvd.nist.gov/vuln/detail/CVE-2024-38193
Related News Articles
Microsoft's Patch Tuesday Fixes 63 Flaws, Including Two Under Active ExploitationFebruary 12, 2025
North Korean Hackers Deploy FudModule Rootkit via Chrome Zero-Day ExploitAugust 31, 2024
North Korean hackers exploit Chrome zero-day to deploy rootkitAugust 31, 2024
0-day in Windows driver exploited by North Korean hackers to deliver rootkit (CVE-2024-38193)August 20, 2024
Windows driver zero-day exploited by Lazarus hackers to install rootkitAugust 20, 2024