Tuesday, February 25, 2025
Homecyber securityMicrosoft Windows Kernel Vulnerability Exploited in the Wild

Microsoft Windows Kernel Vulnerability Exploited in the Wild

Published on

SIEM as a Service

Follow Us on Google News

Microsoft has confirmed the exploitation of a Windows Kernel vulnerability, identified as CVE-2024-37985, in the wild.

This vulnerability, first released on July 9, 2024, and last updated on September 17, 2024, poses a significant risk due to its potential for information disclosure.

The Common Vulnerabilities and Exposures (CVE) system has classified this as an “Important” severity issue.

The vulnerability stems from a weakness identified as CWE-1037: Processor Optimization Removal or Modification of Security-critical Code.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

Attack Vector and Complexity

This flaw can lead to unauthorized information disclosure, affecting the confidentiality of sensitive data.

According to Microsoft’s Common Vulnerability Scoring System (CVSS) version 3.1, the vulnerability scores 5.9 overall and 5.2 in the base metrics.

CVE-2024-37985 is characterized by a local attack vector, meaning an attacker would need physical or remote access to the affected system to exploit it.

Despite this requirement, no privileges or user interaction are necessary for an attack to be successful, which increases the potential risk.

The attack complexity is rated high, indicating that exploiting this vulnerability requires advanced technical skills and knowledge.

The scope of this vulnerability is marked as “changed,” suggesting that successful exploitation could impact other components beyond the initially targeted system.

The primary concern here is confidentiality, which has a high impact. However, integrity and availability remain unaffected.

Currently, the maturity of the exploit code for CVE-2024-37985 is labeled as “unproven,” meaning that while exploitation has been observed in the wild, no publicly available exploit code has been confirmed.

Microsoft has released an official fix to address this vulnerability, urging users and organizations to apply updates promptly to mitigate potential risks.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

New Phishing Attack Targets Amazon Prime Users to Steal Login Credentials

A new phishing campaign targeting Amazon Prime users has been identified, aiming to steal...

LightSpy Malware Expands With 100+ Commands to Target Users Across All Major OS Platforms

The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100...

Critical RCE Vulnerability in MITRE Caldera – Proof of Concept Released

A critical remote code execution (RCE) vulnerability has been uncovered in MITRE Caldera, a...

CISA Alerts: Oracle Agile Vulnerability Actively Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert regarding...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Attack Targets Amazon Prime Users to Steal Login Credentials

A new phishing campaign targeting Amazon Prime users has been identified, aiming to steal...

LightSpy Malware Expands With 100+ Commands to Target Users Across All Major OS Platforms

The LightSpy surveillance framework has significantly evolved its operational capabilities, now supporting over 100...

Critical RCE Vulnerability in MITRE Caldera – Proof of Concept Released

A critical remote code execution (RCE) vulnerability has been uncovered in MITRE Caldera, a...