CVE-2024-38118

5.5 MEDIUM

📋 TL;DR

This vulnerability in Microsoft's Local Security Authority (LSA) Server allows an authenticated attacker to read sensitive information from memory. It affects Windows systems where an attacker has already gained some level of access. The vulnerability could expose credentials or other security tokens that should remain protected.

💻 Affected Systems

Products:
  • Windows
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Windows versions are vulnerable. The attacker must have some level of authenticated access to exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could extract sensitive authentication tokens or credentials from memory, potentially enabling lateral movement or privilege escalation within the network.

🟠

Likely Case

An authenticated attacker reads limited memory contents, potentially exposing some security information but requiring additional steps to weaponize.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to information disclosure that doesn't directly lead to system compromise.

🌐 Internet-Facing: LOW - This requires authenticated access, making direct internet exploitation unlikely without other vulnerabilities.
🏢 Internal Only: MEDIUM - Internal attackers with some level of access could exploit this to gather sensitive information for further attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of memory structures. No public proof-of-concept has been released as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the July 2024 security updates or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38118

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Click 'Check for updates'. 3. Install all available security updates. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict LSA access

windows

Limit which users and processes can interact with LSA components

Not applicable - requires Group Policy or security policy configuration

🧯 If You Can't Patch

  • Implement strict access controls to limit who can authenticate to affected systems
  • Monitor for unusual LSA-related activity and memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check Windows version and update status. Vulnerable if running affected versions without July 2024 security updates.

Check Version:

wmic os get caption, version, buildnumber, csdversion

Verify Fix Applied:

Verify that July 2024 or later security updates are installed and system has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual LSA process memory access
  • Multiple failed authentication attempts followed by successful access

Network Indicators:

  • Unusual authentication traffic patterns to domain controllers

SIEM Query:

EventID=4688 AND ProcessName LIKE '%lsass.exe%' AND CommandLine CONTAINS 'memory'

🔗 References

📤 Share & Export