CVE-2024-38191

7.8 HIGH

📋 TL;DR

This CVE describes an elevation of privilege vulnerability in the Windows Kernel Streaming Service Driver. It allows authenticated attackers to execute arbitrary code with SYSTEM privileges, affecting Windows systems with the vulnerable driver installed. Attackers must already have local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with the Kernel Streaming Service Driver enabled are vulnerable. This is typically enabled by default on affected Windows versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker gains full SYSTEM privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement across the network.

🟠

Likely Case

Malicious insiders or attackers with initial access escalate privileges to bypass security controls, install malware, or access sensitive system resources.

🟢

If Mitigated

With proper access controls and monitoring, exploitation attempts can be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system, this vulnerability provides an easy path to full system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local authenticated access. The vulnerability is in a kernel driver, making exploitation relatively straightforward for attackers with the right knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates (KB5040442 for Windows 10, KB5040437 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38191

Restart Required: Yes

Instructions:

1. Apply the July 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS, SCCM, or Intune. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable Kernel Streaming Service Driver

windows

Disable the vulnerable driver if not required for system functionality

sc config ks.sys start= disabled
sc stop ks.sys

Restrict driver loading

windows

Use Windows Defender Application Control to restrict loading of vulnerable drivers

🧯 If You Can't Patch

  • Implement strict access controls to limit who can authenticate to vulnerable systems
  • Enable Windows Defender Exploit Guard and configure Attack Surface Reduction rules

🔍 How to Verify

Check if Vulnerable:

Check if the system has the vulnerable driver version by examining driver files or checking Windows Update history for missing July 2024 patches

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify the July 2024 security updates are installed via 'winver' command or Windows Update history

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4697: Service installation in Security logs
  • Suspicious driver loading events
  • Privilege escalation attempts in Windows Security logs

Network Indicators:

  • Unusual outbound connections from systems after local authentication events
  • Lateral movement attempts from previously compromised systems

SIEM Query:

EventID=4697 AND (ServiceFileName="*ks.sys*" OR ServiceName="Kernel Streaming Service")

🔗 References

📤 Share & Export