CVE-2024-10972

7.3 HIGH

📋 TL;DR

This vulnerability allows an attacker with administrative privileges to cause a Blue Screen of Death (BSOD) by manipulating memory access rights during WinPmem's operation. It affects users of Velocidex WinPmem version 4.1 and below who run the tool with admin privileges. The issue stems from improper input validation that allows user-space changes to page permissions mid-routine.

💻 Affected Systems

Products:
  • Velocidex WinPmem
Versions: 4.1 and below
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when run with administrative privileges. The tool is typically used by incident responders and forensic analysts.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash (BSOD) leading to denial of service, potential data loss from unsaved work, and disruption of forensic/memory analysis operations.

🟠

Likely Case

Targeted BSOD attacks against systems where WinPmem is running with admin privileges, causing temporary service disruption during incident response or forensic investigations.

🟢

If Mitigated

Minimal impact if proper access controls prevent unauthorized users from running WinPmem or if the tool is only used in controlled forensic environments.

🌐 Internet-Facing: LOW - WinPmem is typically not exposed to internet-facing interfaces and requires local admin access.
🏢 Internal Only: MEDIUM - Requires admin privileges but could be exploited by malicious insiders or compromised admin accounts during forensic operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires admin access and ability to run parallel threads during WinPmem operation. Exploitation requires specific timing conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v4.1.dev1

Vendor Advisory: https://github.com/Velocidex/WinPmem/releases/tag/v4.1.dev1

Restart Required: No

Instructions:

1. Download v4.1.dev1 from GitHub releases. 2. Replace existing WinPmem binaries with patched version. 3. No restart required as this is a user-space tool.

🔧 Temporary Workarounds

Restrict WinPmem Usage

windows

Implement policy to only allow WinPmem execution during authorized incident response operations with proper oversight.

Use Windows AppLocker or similar to restrict winpmem.sys driver loading
Implement least privilege principles for forensic tools

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from running WinPmem with admin privileges.
  • Monitor for unauthorized loading of winpmem.sys driver outside of approved incident response activities.

🔍 How to Verify

Check if Vulnerable:

Check WinPmem version: if version is 4.1 or below, system is vulnerable when tool is run with admin privileges.

Check Version:

winpmem.exe --version or check file properties of winpmem.sys

Verify Fix Applied:

Verify WinPmem version is v4.1.dev1 or higher. Test memory acquisition functionality to ensure no BSOD occurs during normal operation.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service winpmem installed
  • Driver load events for winpmem.sys
  • Unexpected BSOD events following WinPmem execution

Network Indicators:

  • Typically none - local tool execution

SIEM Query:

source="windows" (event_id=7045 AND service_name="winpmem") OR (driver_name="winpmem.sys")

🔗 References

📤 Share & Export