CVE-2024-21338

7.8 HIGH

📋 TL;DR

CVE-2024-21338 is a Windows kernel elevation of privilege vulnerability that allows authenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Windows systems where an attacker has already gained initial access. The vulnerability is being actively exploited by threat actors including the Lazarus group.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; exploited in BYOVD (Bring Your Own Vulnerable Driver) attacks by the Lazarus group.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level persistence, installation of rootkits, credential theft, and lateral movement across the network.

🟠

Likely Case

Privilege escalation from standard user/admin to kernel-level SYSTEM privileges, enabling installation of malware, disabling security controls, and maintaining persistence.

🟢

If Mitigated

Limited impact if proper endpoint protection, application control, and least privilege principles are enforced, though kernel-level access remains dangerous.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires authenticated access and driver manipulation; actively exploited by advanced persistent threats.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: February 2024 security updates (KB5034765 for Windows 10, KB5034768 for Windows 11)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338

Restart Required: Yes

Instructions:

1. Apply February 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Block vulnerable drivers

windows

Use Windows Defender Application Control or similar solutions to block untrusted drivers.

Configure Windows Defender Application Control policies to allow only signed drivers

Enable Hypervisor-protected Code Integrity

windows

Enable HVCI to protect against driver-based attacks.

Enable via Group Policy: Computer Configuration > Administrative Templates > System > Device Guard > Turn On Virtualization Based Security

🧯 If You Can't Patch

  • Implement strict application control policies to prevent unauthorized driver loading
  • Enforce least privilege access and monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check if February 2024 security updates are installed via 'systeminfo' command or Windows Update history.

Check Version:

wmic qfe list | findstr KB5034765

Verify Fix Applied:

Verify KB5034765 (Windows 10) or KB5034768 (Windows 11) is installed in Installed Updates.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 7045: Service installation events for suspicious drivers
  • Event ID 4697: Service installation in security logs
  • Unexpected driver loading events

Network Indicators:

  • Unusual outbound connections following driver installation
  • Command and control traffic from system processes

SIEM Query:

source="windows" event_id=7045 OR event_id=4697 | where service_name contains suspicious_driver_name

🔗 References

📤 Share & Export