Windows Secure Kernel Mode Elevation of Privilege Vulnerability
Released: Oct 8, 2024
Last updated: Nov 12, 2024
- Assigning CNA
- Microsoft
- CVE.org link
- CVE-2024-43516
- Impact
- Elevation of Privilege
- Max Severity
- Important
- Weakness
- CVSS Source
- Microsoft
- Vector String
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
- Metrics
- CVSS:3.1 7.8 / 6.8Base score metrics: 7.8 / Temporal score metrics: 6.8
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
Please see Common Vulnerability Scoring System for more information on the definition of these metrics.
Exploitability
The following table provides an exploitability assessment for this vulnerability at the time of original publication.
- Publicly disclosed
- No
- Exploited
- No
- Exploitability assessment
- Exploitation Less Likely
FAQ
Are there additional actions I need to take after installing November 12, 2024 update?
This update affects a component of Virtualization-based Security (VBS). The policy mitigations described in KB5042562: Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates - Microsoft Support have been updated to accommodate these changes. If you have previously applied the mitigation policies, we recommend that you consider updating to the latest policies.
What privileges could be gained by an attacker who successfully exploited this vulnerability?
An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Acknowledgements
- Microsoft Offensive Research & Security Engineering (MORSE)
Security Updates
To determine the support lifecycle for your software, see the Microsoft Support Lifecycle.
- 10.0.14393.7515
- 10.0.14393.7515
- 10.0.14393.7515
- 10.0.14393.7515
- 10.0.10240.20826
- 10.0.10240.20826
- 10.0.26100.2303
- 10.0.26100.2240
- 10.0.26100.2303
- 10.0.26100.2240
- 10.0.25398.1251
- 10.0.22631.4460
- 10.0.22631.4460
- 10.0.19045.5131
- 10.0.19045.5131
- 10.0.19045.5131
- 10.0.22621.4460
- 10.0.22621.4460
- 10.0.19044.5131
- 10.0.19044.5131
- 10.0.19044.5131
- 10.0.22000.3260
- 10.0.22000.3260
- 10.0.20348.2849
- 10.0.20348.2819
- 10.0.20348.2849
- 10.0.20348.2819
- 10.0.17763.6532
- 10.0.17763.6532
- 10.0.17763.6532
- 10.0.17763.6532
Disclaimer
Revisions
The following updates have been made: 1) To comprehensively address this vulnerability, Microsoft has released October 2024 security updates for all affected client versions of Windows 10 and Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022. Microsoft recommends that customers install the updates to be fully protected from the vulnerability. Customers whose systems are configured to receive automatic updates do not need to take any further action.2) FAQ added to explain further recommended actions to take after installing the November 2024 security update: This update affects a component of Virtualization-based Security (VBS). The policy mitigations described in KB5042562: Guidance for blocking rollback of Virtualization-based Security (VBS) related security updates - Microsoft Support have been updated to accommodate these changes. If you have previously applied the mitigation policies, we recommend that you consider updating to the latest policies.
Information published.