CVE-2024-38146

7.5 HIGH

📋 TL;DR

This vulnerability in the Windows Layer-2 Bridge Network Driver allows an attacker to cause a denial of service (system crash/BSOD) by sending specially crafted network packets. It affects Windows systems with the Layer-2 Bridge feature enabled. The vulnerability requires network access to the target system.

💻 Affected Systems

Products:
  • Windows
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if Layer-2 Bridge network feature is enabled. This is not enabled by default in most Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash (Blue Screen of Death) requiring manual reboot, potentially disrupting critical services and causing data loss in unsaved work.

🟠

Likely Case

Targeted denial of service attacks against specific Windows systems, causing temporary unavailability until reboot.

🟢

If Mitigated

Minimal impact if systems are properly segmented and network access is restricted.

🌐 Internet-Facing: MEDIUM - Systems directly exposed to untrusted networks could be targeted, but requires Layer-2 Bridge feature to be enabled.
🏢 Internal Only: LOW - Internal attackers with network access could exploit, but Layer-2 Bridge is not commonly enabled by default.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access and knowledge of Layer-2 Bridge configuration. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates (KB5040442 for Windows 11, KB5040434 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38146

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates via Windows Update. 2. Alternatively, download and install the specific KB patch for your Windows version from Microsoft Update Catalog. 3. Restart the system after installation.

🔧 Temporary Workarounds

Disable Layer-2 Bridge feature

windows

Disable the vulnerable network component if not required for operations

netsh bridge set adapter 1 forcecompatmode=enable
netsh bridge set adapter 2 forcecompatmode=enable
Disable Network Bridge in Network Connections settings

Network segmentation

all

Restrict network access to systems with Layer-2 Bridge enabled

🧯 If You Can't Patch

  • Disable Layer-2 Bridge network feature if not required
  • Implement network segmentation and firewall rules to restrict access to affected systems

🔍 How to Verify

Check if Vulnerable:

Check if Layer-2 Bridge is enabled via Network Connections or using 'netsh bridge show adapter' command

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2024 security updates are installed via 'systeminfo' command or Windows Update history

📡 Detection & Monitoring

Log Indicators:

  • System crash/BSOD events in Windows Event Log (Event ID 41)
  • Unexpected system reboots
  • Network bridge service errors

Network Indicators:

  • Unusual network traffic patterns to systems with Layer-2 Bridge enabled
  • Malformed network packets targeting bridge interfaces

SIEM Query:

EventID=41 OR (Source="Kernel-Power" AND EventID=41) OR (Source="Microsoft-Windows-Kernel-General" AND EventID=12)

🔗 References

📤 Share & Export