A critical Windows File Explorer flaw, CVE-2024-38100, has been exploited, allowing attackers to gain admin-level access through an Elevation of Privilege (EoP) vulnerability.
CVE-2024-38100
The flaw in the ShellWindows DCOM object (CLSID {9BA05972-F6A8-11CF-A442-00A0C90A8F39}
) in Windows File Explorer allows attackers to exploit improper access controls when File Explorer runs at a High Integrity Level.
Attackers could use COM Cross-Session Activation to create a ShellWindows object in an elevated session, like an administrator’s, according to the analysis. They could then use methods like ShellExecute
to escalate privileges, run commands, or launch reverse shells.
The flaw, assigned a CVSS v3.1 score of 7.8 (high severity), could allow:
- Unauthorized access to sensitive files and resources.
- Installation of malicious software.
- System modifications or full compromise.
Exploitation requires only local access, with low attack complexity. A proof-of-concept exploit disclosed in July 2024 further raises the risk of active attacks.
Affected Windows Server versions include:
- Windows Server 2016: Below 10.0.14393.7159
- Windows Server 2019: Below 10.0.17763.6054
- Windows Server 2022: Below 10.0.20348.2582
- Windows Server 2022 (23H2): Below 10.0.25398.1009
Mitigation and Patch Availability
Microsoft resolved this vulnerability in the July 2024 Patch Tuesday update (KB5040434), removing unnecessary permissions for Authenticated Users when File Explorer runs at a High Integrity Level.
Recommended Actions:
- Apply Security Updates: Update all affected systems to the latest patched versions.
- Implement Least Privilege: Limit user permissions to the minimum necessary.
- Monitor Activity: Audit logs regularly for unusual behavior indicating exploitation attempts.
- Educate Users: Raise awareness about risks of running untrusted software or handling suspicious files.
The exploitation of CVE-2024-38100 highlights the need for proactive security practices and timely patching. Organizations should prioritize updates and enhance their defenses to mitigate related risks.
Follow Us on: Twitter, Instagram, Facebook to get the latest security news!
Leave A Comment