CVE-2024-38057

7.8 HIGH

📋 TL;DR

This vulnerability in the Kernel Streaming WOW Thunk Service Driver allows attackers to gain elevated SYSTEM privileges on Windows systems. It affects Windows 10, 11, and Server versions where an authenticated attacker could execute arbitrary code with kernel-level permissions. The vulnerability stems from improper bounds checking in kernel memory operations.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: All versions prior to July 2024 security updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both 32-bit and 64-bit systems. The WOW (Windows on Windows) component handles 32-bit applications on 64-bit systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, disabling security controls, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM, allowing attackers to bypass security controls, install backdoors, or access protected system resources.

🟢

If Mitigated

Limited impact if proper endpoint protection, application control, and least privilege principles are enforced, though kernel-level vulnerabilities remain serious.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system.
🏢 Internal Only: HIGH - Once an attacker gains initial access (via phishing, credential theft, etc.), they can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local authenticated access. Exploitation involves kernel memory manipulation which requires specific technical knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates (KB5040442 for Windows 11, KB5040434 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38057

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS, Microsoft Endpoint Configuration Manager, or Microsoft Intune. 3. Verify update installation and restart systems.

🔧 Temporary Workarounds

Disable vulnerable driver

windows

Disable or restrict the Kernel Streaming WOW Thunk Service Driver if not required

sc config ks.sys start= disabled
sc stop ks.sys

Enable Hypervisor-protected Code Integrity

windows

Enable HVCI to provide additional protection against kernel exploits

🧯 If You Can't Patch

  • Implement application control policies to prevent unauthorized code execution
  • Enforce least privilege access and network segmentation to limit lateral movement

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for July 2024 security updates or run: wmic qfe list | findstr "5040442 5040434"

Check Version:

winver or systeminfo | findstr "OS Name OS Version"

Verify Fix Applied:

Verify July 2024 security updates are installed via Settings > Windows Update > Update history or using: systeminfo | findstr "KB5040442 KB5040434"

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with parent process spawning SYSTEM processes
  • Unexpected kernel driver loads
  • Security log entries showing privilege escalation

Network Indicators:

  • Unusual outbound connections from SYSTEM processes
  • Lateral movement attempts from previously compromised hosts

SIEM Query:

EventID=4688 AND NewProcessName="*" AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1938"

🔗 References

📤 Share & Export