Monday, May 19, 2025
HomeCVE/vulnerabilityPoC Exploit Released For 0-Day Windows Kernel Privilege Escalation Vulnerability

PoC Exploit Released For 0-Day Windows Kernel Privilege Escalation Vulnerability

Published on

SIEM as a Service

Follow Us on Google News

Microsoft released several patches for multiple vulnerabilities during the Patch Tuesday for August 2024. One of the vulnerabilities listed by Microsoft was the CVE-2024-38106.

This vulnerability is associated with Windows Kernel Privilege Escalation affecting multiple Microsoft Windows OSes including Windows 10, 11 and Windows Server (2016, 2019, 2022). 

Moreover, Microsoft stated that this vulnerability was actively exploited by threat actors.

- Advertisement - Google News

As a matter of fact, Microsoft also mentioned that no user interaction was required for exploiting this vulnerability.

The severity for this vulnerability was given as 7.0 (High).

Technical Analysis – CVE-2024-38106

According to the reports shared with Cyber Security News, CVE-2024-38106 was linked to a race condition.

Successful exploitation of this vulnerability could lead to the threat actor gaining SYSTEM level privileges on the affected system.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14 day free trial

Further, it was stated that the vulnerability was a little complex to exploit.

Researchers at Pixiepoint investigated the patch for this vulnerability. It was revealed that the fix was made on the ntoskrnl.exe that was also responsible for several other bugs fixed by Microsoft.

On analyzing further, there were two security changes made to the functions VslGetSetSecureContext() and NtSetInformationWorkerFactory().

Fix analysis (Source: Pixiepoint)

VslGetSetSecureContext() was implemented with a fix to mitigate a race condition. This was done by making the function properly lock the VslpEnterIumSecureMode() operation that was related to the VBS secure kernel.

NtSetInformationWorkerFactory() was implemented with a similar fix for mitigating a race condition.

However, here it was done by adding a flag inside NtShutdownWorkerFactory() –> ExpShutdownWorkerFactory():

However, the proof of concept code can be found below. As per the proof of concept, it triggers calling the NtClose() on worker factory object handles to achieve a vulnerable state.

This will result in reaching KiInsertTimer2WithCollectionLockHeld() worker factory object and freeing the associated timer.

Organizations should apply the necessary patches to vulnerable products to prevent them from being exploited.

What Does MITRE ATT&CK Expose About Your Enterprise Security? - Watch Free Webinar!

Eswar
Eswar
Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

Hackers Exploit RVTools to Deploy Bumblebee Malware on Windows Systems

A reliable VMware environment reporting tool, RVTools, was momentarily infiltrated earlier this week on...

Confluence Servers Under Attack: Hackers Leverage Vulnerability for RDP Access and Remote Code Execution

Threat actors exploited a known vulnerability, CVE-2023-22527, a template injection flaw in Atlassian Confluence...

New ModiLoader Malware Campaign Targets Windows PCs, Harvesting User Credentials

AhnLab Security Intelligence Center (ASEC) has recently uncovered a malicious campaign distributing ModiLoader (also...

Health Care Data Breach Costs BreachForums Admin $700,000 Fine

Conor Brian Fitzpatrick, the 22-year-old former administrator of cybercrime forum Breachforums, will forfeit approximately...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Hackers Exploit RVTools to Deploy Bumblebee Malware on Windows Systems

A reliable VMware environment reporting tool, RVTools, was momentarily infiltrated earlier this week on...

Confluence Servers Under Attack: Hackers Leverage Vulnerability for RDP Access and Remote Code Execution

Threat actors exploited a known vulnerability, CVE-2023-22527, a template injection flaw in Atlassian Confluence...

New ModiLoader Malware Campaign Targets Windows PCs, Harvesting User Credentials

AhnLab Security Intelligence Center (ASEC) has recently uncovered a malicious campaign distributing ModiLoader (also...