9.8 CVE-2024-38063

Enriched by CISA Patch Exploit
 

Windows TCP/IP Remote Code Execution Vulnerability
https://nvd.nist.gov/vuln/detail/CVE-2024-38063

Categories

CWE-191 : Integer Underflow (Wrap or Wraparound)
This can happen in signed and unsigned cases.

CWE-NVD-noinfo

References

secure@microsoft.com Patch


 

AFFECTED (from MITRE)


Vendor Product Versions
Microsoft Windows 10 Version 1809
  • 10.0.17763.0 < 10.0.17763.6293 [affected]
Microsoft Windows Server 2019
  • 10.0.17763.0 < 10.0.17763.6293 [affected]
Microsoft Windows Server 2019 (Server Core installation)
  • 10.0.17763.0 < 10.0.17763.6293 [affected]
Microsoft Windows Server 2022
  • 10.0.20348.0 < 10.0.20348.2700 [affected]
Microsoft Windows 11 version 21H2
  • 10.0.0 < 10.0.22000.3197 [affected]
Microsoft Windows 10 Version 21H2
  • 10.0.19043.0 < 10.0.19044.4780 [affected]
Microsoft Windows 11 version 22H2
  • 10.0.22621.0 < 10.0.22621.4037 [affected]
Microsoft Windows 10 Version 22H2
  • 10.0.19045.0 < 10.0.19045.4780 [affected]
Microsoft Windows 11 version 22H3
  • 10.0.22631.0 < 10.0.22631.4037 [affected]
Microsoft Windows 11 Version 23H2
  • 10.0.22631.0 < 10.0.22631.4037 [affected]
Microsoft Windows Server 2022, 23H2 Edition (Server Core installation)
  • 10.0.25398.0 < 10.0.25398.1085 [affected]
Microsoft Windows 10 Version 1507
  • 10.0.10240.0 < 10.0.10240.20751 [affected]
Microsoft Windows 10 Version 1607
  • 10.0.14393.0 < 10.0.14393.7259 [affected]
Microsoft Windows Server 2016
  • 10.0.14393.0 < 10.0.14393.7259 [affected]
Microsoft Windows Server 2016 (Server Core installation)
  • 10.0.14393.0 < 10.0.14393.7259 [affected]
Microsoft Windows Server 2008 Service Pack 2
  • 6.0.6003.0 < 6.0.6003.22825 [affected]
Microsoft Windows Server 2008 Service Pack 2 (Server Core installation)
  • 6.0.6003.0 < 6.0.6003.22825 [affected]
Microsoft Windows Server 2008 Service Pack 2
  • 6.0.6003.0 < 6.0.6003.22825 [affected]
Microsoft Windows Server 2008 R2 Service Pack 1
  • 6.1.7601.0 < 6.1.7601.27277 [affected]
Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation)
  • 6.1.7601.0 < 6.1.7601.27277 [affected]
Microsoft Windows Server 2012
  • 6.2.9200.0 < 6.2.9200.25031 [affected]
Microsoft Windows Server 2012 (Server Core installation)
  • 6.2.9200.0 < 6.2.9200.25031 [affected]
Microsoft Windows Server 2012 R2
  • 6.3.9600.0 < 6.3.9600.22134 [affected]
Microsoft Windows Server 2012 R2 (Server Core installation)
  • 6.3.9600.0 < 6.3.9600.22134 [affected]
Microsoft Windows 11 Version 24H2
  • 10.0.26100.0 < 10.0.26100.1457 [affected]
© 2022 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

CPE

cpe start end
Configuration 1
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* < 10.0.10240.20751
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* < 10.0.14393.7259
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* < 10.0.17763.6189
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* < 10.0.19044.4780
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* < 10.0.19045.4780
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* < 10.0.22000.3147
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* < 10.0.22621.4037
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:* < 10.0.22631.4037
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:* < 10.0.26100.1457
cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*
cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* < 6.2.9200.25031
cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* < 10.0.14393.7259
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* < 10.0.17763.6189
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* < 10.0.20348.2655
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* < 10.0.25398.1085


REMEDIATION


Patch

Url
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38063


EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
https://github.com/Sachinart/CVE-2024-38063-POC
https://github.com/patchpoint/CVE-2024-38063
https://github.com/PumpkinBridge/Windows-CVE-2024-38063
https://github.com/zenzue/CVE-2024-38063-POC
https://github.com/selenagomez25/CVE-2024-38063
https://github.com/Avidan1/CVE-2024-38063

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
No entry