diff --git a/docs/advisories/20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md b/docs/advisories/20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md new file mode 100644 index 00000000..5d2b2fee --- /dev/null +++ b/docs/advisories/20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md @@ -0,0 +1,17 @@ +# Windows Kernel Elevation of Privilege Vulnerability - 20240429001 + +## Overview + +The Windows Kernel Elevation of Privilege vulnerability allows authenticated attackers to escalate privileges to the SYSTEM level, granting them full control over affected systems. + +## What is vulnerable? + +| CVE | Severity | CVSS | Product(s) Affected | +| ----------------------------------------------------------------- | -------- | ---- | ---------------------------------------------------------------- | +| [CVE-2024-21345](https://nvd.nist.gov/vuln/detail/CVE-2024-21345) | **High** | 8.8 | **Windows Server 2022, 23H2 Edition** (Server Core installation) | + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)): + +- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21345