CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-38124

High Severity
Microsoft
SVRS
40/100

CVSSv3
9.0/10

EPSS
0.00456/1

CVE-2024-38124 is a Windows Netlogon Elevation of Privilege vulnerability. This flaw allows an attacker to gain elevated privileges on a system, potentially leading to complete control. While the CVSS score is 9, indicating high severity, the SOCRadar Vulnerability Risk Score (SVRS) is 40, suggesting a lower level of immediate threat compared to vulnerabilities with SVRS scores above 80. The vulnerability arises from improper authentication handling within the Netlogon protocol. Successful exploitation could enable an attacker to execute arbitrary code with elevated privileges, making it a significant security risk. Despite the moderate SVRS score, organizations should still address this elevation of privilege vulnerability to prevent potential future exploitation, especially given its presence "In The Wild". Addressing this vulnerability proactively is crucial for maintaining a secure network environment.

In The Wild
Vendor-advisory
CVSS:3.1
AV:A
AC:L
PR:L
UI:N
S:C
C:H
I:H
A:H
E:U
RL:O
RC:C
2024-10-08

2025-01-29

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

The October 2024 Security Update Review
Dustin Childs2024-12-02
The October 2024 Security Update Review | It’s the spooky season, and there’s nothing spookier than security patches – at least in my world. Microsoft and Adobe have released their latest patches, and no bones about it, there are some skeletons in those closets. Take a break from your regular activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for
zerodayinitiative.com
rss
forum
news
Tripwire Patch Priority Index for October 2024 - tripwire.com
2024-11-05
Tripwire Patch Priority Index for October 2024 - tripwire.com | Description: Tripwire's October 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. | News Content: Image Tripwire's October 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the list are patches for Microsoft Edge, Office, Excel, and Visio that resolve remote code execution, elevation of privilege, and spoofing vulnerabilities. Next are patches that affect components of the core Windows operating system. These patches resolve over 80 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, denial of service, and remote code execution vulnerabilities. These
google.com
rss
forum
news
Vulnerability Recap 10/15/24 – Patch Tuesday Posts 117 Vulnerabilities
Jenna Phipps2024-10-15
Vulnerability Recap 10/15/24 – Patch Tuesday Posts 117 Vulnerabilities | We take a look at the past week’s exploited vulnerabilities, including previous Ivanti and Veeam flaws, and also cover critical Patch Tuesday fixes. The post Vulnerability Recap 10/15/24 – Patch Tuesday Posts 117 Vulnerabilities appeared first on eSecurity Planet.Today, we’re looking at this past week’s critical vulnerabilities in networking products, browsers, and DevOps platforms. Microsoft
esecurityplanet.com
rss
forum
news
Patch Tuesday - October 2024
Adam Barnett2024-10-08
Patch Tuesday - October 2024 | 5 zero-days. Configuration Manager pre-auth RCE. RDP RPC pre-auth RPC. Winlogon EoP. Hyper-V container escape. curl o-day RCE late patch. Management console zero-day RCE. Windows 11 lifecycle changes.Microsoft is addressing 118 vulnerabilities this October 2024 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation and/or public disclosure for five of the vulnerabilities published today, although it does not rate any of these as
cve-2024-43583
cve-2024-43590
cve-2024-43520
cve-2024-43546
1.754
2024-10-09
1.754 | Newly Added (102)Microsoft Windows Secure Kernel Mode CVE-2024-43516 Elevation of Privilege VulnerabilityMicrosoft Windows Routing and Remote Access Service CVE-2024-38261 Remote Code Execution VulnerabilityMicrosoft .NET and Visual Studio CVE-2024-38229 Remote Code Execution Vulnerability<
cve-2024-43567
cve-2024-43520
cve-2024-43518
cve-2024-38262

Social Media

@electrocode CVE-2024-38124 yok mu :)
0
0
0
RT @sekurlsa_pw: CVE-2024-38124: Predict the name of the New Domain controller and become Domain Admin. Reminds me of sAMAccountName Spoofi…
0
49
0
Anyone has gotten a look at CVE-2024-38124? Seems interesting! 😉
0
0
1

Affected Software

Configuration 1
TypeVendorProduct
OSMicrosoftwindows_server_2022
OSMicrosoftwindows_server_2008
OSMicrosoftwindows_server_2022_23h2
OSMicrosoftwindows_server_2019
OSMicrosoftwindows_server_2016
OSMicrosoftwindows_server_2012

References

ReferenceLink
[email protected]https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38124
WINDOWS NETLOGON ELEVATION OF PRIVILEGE VULNERABILITYhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38124

CWE Details

CWE IDCWE NameDescription
CWE-287Improper AuthenticationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence