CVE-2024-38202
📋 TL;DR
This Windows Update vulnerability allows attackers with basic user privileges to elevate privileges by tricking administrators into performing system restores. It could reintroduce previously patched vulnerabilities or bypass Virtualization Based Security features. All Windows systems using affected versions are potentially vulnerable.
💻 Affected Systems
- Windows Update
- Windows Backup
📦 What is this software?
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains full system control, reintroduces previously mitigated critical vulnerabilities, and bypasses security features like VBS, leading to complete system compromise.
Likely Case
Limited privilege escalation within enterprise environments where attackers can socially engineer administrators into performing system restores.
If Mitigated
No impact if systems are fully patched and administrators follow security best practices regarding system restoration.
🎯 Exploit Status
Requires attacker with basic user privileges AND ability to trick/convince administrator to perform system restore operation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Security update released October 08, 2024
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202
Restart Required: Yes
Instructions:
1. Download security update from Microsoft Security Update Guide. 2. Apply update to all affected Windows systems. 3. Restart systems. 4. Check if WinRE update is required for your Windows version and apply if needed.
🔧 Temporary Workarounds
Restrict System Restore Privileges
windowsLimit who can perform system restore operations to only essential administrators
Enhanced Administrator Training
allTrain administrators to be cautious about system restore requests from untrusted sources
🧯 If You Can't Patch
- Implement strict access controls on system restore functionality
- Monitor for unusual system restore activity and implement approval workflows
🔍 How to Verify
Check if Vulnerable:
Check Windows Update history for October 2024 security updates. If missing, system is likely vulnerable.
Check Version:
wmic qfe list | find "KB" or check Windows Update history in Settings
Verify Fix Applied:
Verify October 08, 2024 security update is installed via Windows Update history or systeminfo command.
📡 Detection & Monitoring
Log Indicators:
- Unexpected system restore operations
- Multiple failed restore attempts
- Restore operations initiated by non-standard users
Network Indicators:
- Unusual backup-related network traffic patterns
SIEM Query:
EventID=11707 OR EventID=11708 in Windows Event Logs (System restore events)
🔗 References
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202
- https://www.vicarius.io/vsociety/posts/cve-2024-38202-potential-elevation-of-privilege-vulnerability-in-windows-backup-detection-script
- https://www.vicarius.io/vsociety/posts/cve-2024-38202-potential-elevation-of-privilege-vulnerability-in-windows-backup-mitigation-script