CVE-2024-38125

7.8 HIGH

📋 TL;DR

This vulnerability in the Windows Kernel Streaming WOW Thunk Service Driver allows attackers to gain SYSTEM-level privileges on affected systems. It affects Windows operating systems where an authenticated attacker could execute arbitrary code with elevated permissions. This is a local privilege escalation vulnerability requiring initial access to the system.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with the vulnerable driver component present, which is included in standard Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and disabling of security controls.

🟠

Likely Case

Privilege escalation from standard user to SYSTEM, allowing attackers to bypass security controls, install additional malware, or access protected system resources.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation are in place, though local privilege escalation remains possible.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system, not directly exploitable over the network.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (through phishing, credential theft, etc.), they can exploit this to gain full system control and potentially move laterally.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the system. Exploitation involves manipulating the Kernel Streaming WOW Thunk Service Driver through specific API calls or system calls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates (KB5040437 for Windows 11, KB5040435 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38125

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Click 'Check for updates'. 3. Install the July 2024 security updates. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable vulnerable driver

windows

Disable or restrict the Kernel Streaming WOW Thunk Service Driver if not required

sc stop ks
sc config ks start= disabled

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users operate with minimal necessary permissions
  • Deploy endpoint detection and response (EDR) solutions to detect privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Windows version and installed updates. Systems without July 2024 security updates are vulnerable.

Check Version:

wmic os get caption, version, buildnumber, csdversion

Verify Fix Applied:

Verify that July 2024 security updates (KB5040437, KB5040435, or equivalent) are installed via Windows Update history.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation with SYSTEM privileges
  • Suspicious driver loading or manipulation events
  • Security event 4688 with elevated privileges

Network Indicators:

  • Not applicable - local privilege escalation

SIEM Query:

EventID=4688 AND NewProcessName CONTAINS 'cmd.exe' OR 'powershell.exe' AND SubjectUserName != SYSTEM AND TokenElevationType != %%1936

🔗 References

📤 Share & Export