From e6c87f4b46cd9ba1676259b4e8d737178f290cad Mon Sep 17 00:00:00 2001 From: Serki Ashagre <132869385+LSerki@users.noreply.github.com> Date: Mon, 29 Apr 2024 15:44:56 +0800 Subject: [PATCH] Windows Kernel Elevation of Privilege Vulnerability - 20240429001 (#681) MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit * SolarWinds Releases Patches for Access Rights Manager vulnerabilities - 20240219001 * Format markdown files * Format markdown files * Junos OS RCE Vulnerability - 20240226002 * Format markdown files * Windows Themes Spoofing Vulnerability - 20240308003 * Format markdown files * Windows Themes Spoofing Vulnerability - 20240308003 - edited * Akamai Kubernetes Vulnerability - 20240318002 * Format markdown files * CISA Releases Multiple Critical Infrastructure Related Advisories - 20240327001 * Format markdown files * PGAdmin Remote Code Execution Vulnerability - 20240408001 * Format markdown files * Update 20240408001-PGAdmin-Remote-Code-Execution-Vulnerability.md FIxing tables * Format markdown files * Palo Alto Networks PAN-OS Command Injection Vulnerability added to CISA Known Exploited Catalog - 20240415001 * Format markdown files * Palo Alto Networks PAN-OS Command Injection Vulnerability added to CISA Known Exploited Catalog - 20240415001 * Format markdown files * Update 20240415001-PaloAlto-Networks-PAN-OS-Command-Injection-Vulnerability-added-to-CISA-Known-Exploited-Catalog.md Added older versions updates and Zero day notes * Format markdown files * Google Chrome Multiple RCE Vulnerabilities - 20240418002 * Format markdown docs * Remove duplicate 20240415001-PaloAlto * Update 20240418002-Google-Chrome-Multiple-RCE-Vulnerabilities.md Reviewed and Approved * Format markdown docs * Libreswan Popular VPN Software Vulnerability - 20240419004 * Format markdown docs * Update 20240419004-Libreswan-Popular-VPN-Software-Vulnerability.md Fix table * Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability - 20240422002 * Format markdown docs * Update 20240422002-Microsoft-Edge-Chromium-based-Security-Feature-Bypass-Vulnerability.md fix tables * Windows Kernel Elevation of Privilege Vulnerability - 20240429001 * Format markdown docs * Update 20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md fixing table --------- Co-authored-by: GitHub Actions Co-authored-by: Joshua Hitchen (DGov) <86041569+DGovEnterprise@users.noreply.github.com> Co-authored-by: LSerki Co-authored-by: DGovEnterprise --- ...rnel-Elevation-of-Privilege-Vulnerability.md | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) create mode 100644 docs/advisories/20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md diff --git a/docs/advisories/20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md b/docs/advisories/20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md new file mode 100644 index 000000000..5d2b2fee7 --- /dev/null +++ b/docs/advisories/20240429001-Windows-Kernel-Elevation-of-Privilege-Vulnerability.md @@ -0,0 +1,17 @@ +# Windows Kernel Elevation of Privilege Vulnerability - 20240429001 + +## Overview + +The Windows Kernel Elevation of Privilege vulnerability allows authenticated attackers to escalate privileges to the SYSTEM level, granting them full control over affected systems. + +## What is vulnerable? + +| CVE | Severity | CVSS | Product(s) Affected | +| ----------------------------------------------------------------- | -------- | ---- | ---------------------------------------------------------------- | +| [CVE-2024-21345](https://nvd.nist.gov/vuln/detail/CVE-2024-21345) | **High** | 8.8 | **Windows Server 2022, 23H2 Edition** (Server Core installation) | + +## Recommendation + +The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)): + +- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21345