CVE-2024-38142

7.8 HIGH

📋 TL;DR

This vulnerability allows an attacker with local access to elevate privileges from user mode to kernel mode in Windows Secure Kernel. It affects Windows systems with Secure Kernel enabled, primarily Windows 10 and 11 systems with virtualization-based security features.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2022
Versions: Windows 10 versions 21H2 and later, Windows 11 all versions, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Secure Kernel Mode (SKM) to be enabled, which is part of virtualization-based security features. Systems without VBS/SKM are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with kernel-level access, allowing attackers to bypass security controls, install persistent malware, access sensitive data, and disable security mechanisms.

🟠

Likely Case

Local privilege escalation enabling attackers to gain administrative privileges, install unauthorized software, or access protected system resources.

🟢

If Mitigated

Limited impact due to existing security controls, with potential for detection through security monitoring before significant damage occurs.

🌐 Internet-Facing: LOW - Requires local access to exploit, cannot be triggered remotely over the internet.
🏢 Internal Only: HIGH - Significant risk from insider threats or attackers who gain initial access through other means, enabling lateral movement and privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and existing user privileges. Exploitation likely requires understanding of Windows kernel internals and Secure Kernel architecture.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates (KB5040435 for Windows 11, KB5040431 for Windows 10)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38142

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Check for updates. 3. Install July 2024 security updates. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable Virtualization-Based Security

windows

Disables Secure Kernel Mode by turning off VBS features, which eliminates the vulnerability but reduces security posture.

reg add "HKLM\SYSTEM\CurrentControlSet\Control\DeviceGuard" /v "EnableVirtualizationBasedSecurity" /t REG_DWORD /d 0 /f
shutdown /r /t 0

🧯 If You Can't Patch

  • Implement strict access controls and least privilege principles to limit local user access
  • Enable enhanced monitoring for privilege escalation attempts and kernel-level activities

🔍 How to Verify

Check if Vulnerable:

Check if system has July 2024 security updates installed via 'systeminfo' command or Windows Update history

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5040435 (Win11) or KB5040431 (Win10) is installed and systeminfo shows OS build number with July 2024 updates

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with privileged process creation
  • Security log entries showing unexpected privilege changes
  • Kernel-mode driver loading events

Network Indicators:

  • Unusual outbound connections from system processes
  • Lateral movement attempts following local privilege escalation

SIEM Query:

EventID=4688 AND NewProcessName="*" AND TokenElevationType="%%1938" OR EventID=4672 AND PrivilegeList="SeDebugPrivilege"

🔗 References

📤 Share & Export