CVE-2024-21338

KEV
Published: Feb 13, 2024 Last Modified: Ott 28, 2025
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,8
Attack Vector: local
Attack Complexity: low
Privileges Required: low
User Interaction: none
Scope: unchanged
Confidentiality: high
Integrity: high
Availability: high

Description

AI Translation Available

Windows Kernel Elevation of Privilege Vulnerability

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,7830
Percentile
1,0th
Updated

EPSS Score Trend (Last 90 Days)

822

Untrusted Pointer Dereference

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Availability Integrity
Potential Impacts:
Read Memory Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands Modify Memory
Applicable Platforms
Languages: C, C++, Memory-Unsafe
View CWE Details
Exploit

Microsoft Windows 10.0.17763.5458 - Kernel Privilege Escalation

Microsoft Windows 10.0.17763.5458 - Kernel Privilege Escalation

View Exploit Code →
Exploit

Microsoft Windows 11 - Kernel Privilege Escalation

Microsoft Windows 11 - Kernel Privilege Escalation

View Exploit Code →
Operating System

Windows 11 21H2 by Microsoft

Version Range Affected
To 10.0.22000.2777 (exclusive)
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Server 2022 by Microsoft

Version Range Affected
To 10.0.20348.2322 (exclusive)
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Server 2022 23H2 by Microsoft

Version Range Affected
To 10.0.25398.709 (inclusive)
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 10 22H2 by Microsoft

Version Range Affected
To 10.0.19045.4046 (exclusive)
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 11 22H2 by Microsoft

Version Range Affected
To 10.0.22621.3155 (exclusive)
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 11 23H2 by Microsoft

Version Range Affected
To 10.0.22631.3155 (exclusive)
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 10 1809 by Microsoft

Version Range Affected
To 10.0.17763.5458 (exclusive)
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows Server 2019 by Microsoft

Version Range Affected
To 10.0.17763.5458 (exclusive)
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System

Windows 10 21H2 by Microsoft

Version Range Affected
To 10.0.19044.4046 (exclusive)
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024…
https://decoded.avast.io/janvojtesek/lazarus-and-the-fudmodule-rootkit-beyond-b…
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338
https://packetstorm.news/files/id/190586/
https://www.exploit-db.com/exploits/52275
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21338