CVE-2024-38118
📋 TL;DR
This vulnerability in Microsoft's Local Security Authority (LSA) Server allows an authenticated attacker to read sensitive information from memory. It affects Windows systems where an attacker has already gained some level of access. The vulnerability could expose credentials or other security tokens that should remain protected.
💻 Affected Systems
- Windows
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
Windows 11 24h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
An attacker could extract sensitive authentication tokens or credentials from memory, potentially enabling lateral movement or privilege escalation within the network.
Likely Case
An authenticated attacker reads limited memory contents, potentially exposing some security information but requiring additional steps to weaponize.
If Mitigated
With proper access controls and monitoring, the impact is limited to information disclosure that doesn't directly lead to system compromise.
🎯 Exploit Status
Exploitation requires authenticated access and knowledge of memory structures. No public proof-of-concept has been released as of the advisory date.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apply the July 2024 security updates or later
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38118
Restart Required: Yes
Instructions:
1. Open Windows Update settings. 2. Click 'Check for updates'. 3. Install all available security updates. 4. Restart the system when prompted.
🔧 Temporary Workarounds
Restrict LSA access
windowsLimit which users and processes can interact with LSA components
Not applicable - requires Group Policy or security policy configuration
🧯 If You Can't Patch
- Implement strict access controls to limit who can authenticate to affected systems
- Monitor for unusual LSA-related activity and memory access patterns
🔍 How to Verify
Check if Vulnerable:
Check Windows version and update status. Vulnerable if running affected versions without July 2024 security updates.
Check Version:
wmic os get caption, version, buildnumber, csdversion
Verify Fix Applied:
Verify that July 2024 or later security updates are installed and system has been restarted.
📡 Detection & Monitoring
Log Indicators:
- Unusual LSA process memory access
- Multiple failed authentication attempts followed by successful access
Network Indicators:
- Unusual authentication traffic patterns to domain controllers
SIEM Query:
EventID=4688 AND ProcessName LIKE '%lsass.exe%' AND CommandLine CONTAINS 'memory'