CVE-2024-38116

8.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through the Windows IP Routing Management Snapin. Attackers can exploit this to execute arbitrary code with SYSTEM privileges on affected Windows systems. All Windows systems with the vulnerable component are potentially affected.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with IP Routing Management Snapin enabled are vulnerable. This component is typically present on servers and some client configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges leading to complete control of the Windows host, lateral movement across the network, and data exfiltration.

🟠

Likely Case

Attackers gain SYSTEM privileges on vulnerable systems, install malware, create backdoors, and pivot to other network resources.

🟢

If Mitigated

With proper network segmentation and least privilege, impact is limited to the compromised host with reduced lateral movement potential.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to the vulnerable service and may require some authentication or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38116

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable IP Routing Management Snapin

windows

Remove or disable the vulnerable component if not required for operations

Remove-WindowsFeature -Name Routing
dism /online /disable-feature /featurename:Routing

Network Segmentation

all

Restrict network access to systems running IP routing services

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems with IP routing services
  • Apply principle of least privilege and monitor for suspicious activity on affected systems

🔍 How to Verify

Check if Vulnerable:

Check if July 2024 security updates are installed via 'systeminfo' or Windows Update history

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5035857 (or later) is installed and system has been restarted

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from routing services
  • Failed authentication attempts to routing components
  • Unexpected network connections from routing service

Network Indicators:

  • Suspicious traffic to/from routing service ports
  • Anomalous network routing changes

SIEM Query:

EventID=4688 AND (ProcessName LIKE '%routing%' OR ParentProcessName LIKE '%routing%') AND CommandLine CONTAINS suspicious_pattern

🔗 References

📤 Share & Export