CVE-2024-26237

7.8 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to bypass Windows Defender Credential Guard protections and gain elevated privileges on affected Windows systems. Attackers could potentially access sensitive credential information stored in memory. This affects Windows systems with Credential Guard enabled.

💻 Affected Systems

Products:
  • Windows Defender Credential Guard
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Credential Guard enabled. Systems without Credential Guard are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains SYSTEM-level privileges, accesses all protected credentials including domain admin credentials, and moves laterally across the network with elevated access.

🟠

Likely Case

Local authenticated attacker elevates privileges to access protected credentials for lateral movement within the environment.

🟢

If Mitigated

With proper patch management and Credential Guard configuration, impact is limited to local privilege escalation on already compromised systems.

🌐 Internet-Facing: LOW - This requires local authenticated access, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Internal attackers or malware with local access can exploit this for privilege escalation and credential theft.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access. Exploitation involves bypassing memory protection mechanisms in Credential Guard.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2024 security updates (KB5036893 for Windows 11, KB5036892 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26237

Restart Required: Yes

Instructions:

1. Apply April 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable Credential Guard

windows

Temporarily disable Credential Guard to mitigate the vulnerability (not recommended for production as it removes credential protection)

Disable via Group Policy: Computer Configuration > Administrative Templates > System > Device Guard > Turn On Virtualization Based Security > Disabled

🧯 If You Can't Patch

  • Restrict local administrator privileges to minimize attack surface
  • Implement application control policies to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check if Credential Guard is enabled: Run 'msinfo32' and check 'Virtualization-based security' status. If 'Credential Guard' shows as 'Running', system is vulnerable if unpatched.

Check Version:

wmic os get caption, version, buildnumber, csdversion

Verify Fix Applied:

Verify April 2024 security updates are installed via 'winver' command or Windows Update history. Confirm Credential Guard is still enabled and functioning.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with suspicious parent processes attempting to access lsass.exe
  • Credential Guard related errors in System logs
  • Unexpected privilege escalation events

Network Indicators:

  • Unusual authentication attempts from previously compromised systems
  • Lateral movement using stolen credentials

SIEM Query:

EventID=4688 AND (ProcessName="*lsass*" OR ParentProcessName contains suspicious terms) AND NewProcessName contains privilege escalation tools

🔗 References

📤 Share & Export