CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-29056

Medium Severity
Microsoft
SVRS
30/100

CVSSv3
4.3/10

EPSS
0.0294/1

CVE-2024-29056 is a Windows Authentication Elevation of Privilege Vulnerability. This flaw could allow an attacker to gain elevated privileges within a Windows system. While the CVSS score is 4.3, indicating a moderate severity, understanding the potential impact is crucial. The SOCRadar Vulnerability Risk Score (SVRS) is 30, suggesting that while not critically urgent, the vulnerability should still be monitored and addressed in a timely manner. An attacker successfully exploiting this privilege escalation could potentially take control of affected systems. Given that the CWE is CWE-327 which involves a broken or risky cryptographic algorithm, the underlying issue is the vulnerability's root cause, which exposes the system to potential threats. Immediate patching upon vendor release should be prioritized to mitigate the risk of exploitation. The risk, while not critical according to SVRS, is that it could open the door to further attacks and compromise of sensitive data.

Vendor-advisory
CVSS:3.1
AV:N
AC:L
PR:L
UI:N
S:U
C:L
I:N
A:N
E:U
RL:O
RC:C
2025-05-03

2024-04-09

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

The April 2024 Security Updates Review
Dustin Childs2024-04-09
The April 2024 Security Updates Review | It’s the second Tuesday of the month, and Adobe and Microsoft have released a fresh crop of security updates. Take a break from your other activities and join us as we review the details of their latest advisories. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for April 2024For April, Adobe released nine patches addressing
cve-2024-28917
cve-2024-28926
cve-2024-26217
cve-2024-28943
CVE-2024-29056 | Microsoft Windows Server 2008 R2 SP1 up to Server 2022 Authentication risky encryption
vuldb.com2024-05-15
CVE-2024-29056 | Microsoft Windows Server 2008 R2 SP1 up to Server 2022 Authentication risky encryption | A vulnerability was found in Microsoft Windows. It has been declared as problematic. This vulnerability affects unknown code of the component Authentication. The manipulation leads to risky cryptographic algorithm. This vulnerability was named CVE-2024-29056. The attack can be initiated remotely. There is no exploit available. It
cve-2024-29056
domains
urls
cves

Social Media

Does this "Immediate Action: Enforce PAC Validation for CVE-2024-26248 & CVE-2024-29056" https://t.co/bDrBl3zAzT mean that all Windows clients must be April LCU patched prior to the domain controller's receiving the April LCU? @jarwidmark @miketerrill @Mister_MDM
1
0
0
How to manage PAC Validation changes related to CVE-2024-26248 and CVE-2024-29056 - Microsoft Support https://t.co/voMhjDJHEa #WindowsForum #TheWindowsForum #ThumperDC #ThumperTM
0
0
0
Microsoft fixed Windows CVE-2024-26248, CVE-2024-29056 Kerberos PAC validation flaw - Neowin https://t.co/BRCwR56w7z https://t.co/AnegT5OLbU
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
OSMicrosoftwindows_server_2022
OSMicrosoftwindows_server_2012
OSMicrosoftwindows_server_2008
OSMicrosoftwindows_server_2019
OSMicrosoftwindows_server_2016
OSMicrosoftwindows_server_23h2

References

ReferenceLink
[email protected]https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056
WINDOWS AUTHENTICATION ELEVATION OF PRIVILEGE VULNERABILITYhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056
WINDOWS AUTHENTICATION ELEVATION OF PRIVILEGE VULNERABILITYhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29056

CWE Details

CWE IDCWE NameDescription
CWE-327Use of a Broken or Risky Cryptographic AlgorithmThe use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence