Microsoft Windows systems: Windows TCP/IP Remote Code Execution (CVE-2024-38063) #shorts #breaking

CVE

Today, we're discussing CVE-2024-38063, a recently discovered Windows TCP/IP remote code execution vulnerability. This security issue was identified less than a month ago and affects multiple Microsoft Windows systems, including both desktop and server editions. Although it's not a zero-day vulnerability, meaning it was not exploited before its discovery, it allows attackers to execute remote code on affected machines. This means that without proper security measures, unauthorized individuals could potentially control a victim's system. The exposure includes various versions of Microsoft Windows 10, Windows 11, and Windows Server editions, dating back to older versions. With such a broad range of systems impacted, it's crucial for users and administrators of these Windows environments to be aware of the potential risks.

Watch the full video on YouTube: CVE-2024-38063

Remediation and exploitation details

This chain involves the following actors

This following systems are involved

Attack entry point

Remediation actions

Exploitation actions

Related Content

NOTE: The following related content has not been vetted and may be unsafe.

CVE database technical details

CVE ID
CVE-2024-38063
Description
Windows TCP/IP Remote Code Execution Vulnerability
Provider
microsoft
CWE / problem types
CWE-191: Integer Underflow (Wrap or Wraparound)
Affected Software Versions
Microsoft:Windows 10 Version 1809:[{'version': '10.0.17763.0', 'lessThan': '10.0.17763.6293', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2019:[{'version': '10.0.17763.0', 'lessThan': '10.0.17763.6293', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2019 (Server Core installation):[{'version': '10.0.17763.0', 'lessThan': '10.0.17763.6293', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2022:[{'version': '10.0.20348.0', 'lessThan': '10.0.20348.2700', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 11 version 21H2:[{'version': '10.0.0', 'lessThan': '10.0.22000.3197', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 10 Version 21H2:[{'version': '10.0.19043.0', 'lessThan': '10.0.19044.4780', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 11 version 22H2:[{'version': '10.0.22621.0', 'lessThan': '10.0.22621.4037', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 10 Version 22H2:[{'version': '10.0.19045.0', 'lessThan': '10.0.19045.4780', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 11 version 22H3:[{'version': '10.0.22631.0', 'lessThan': '10.0.22631.4037', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 11 Version 23H2:[{'version': '10.0.22631.0', 'lessThan': '10.0.22631.4037', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2022, 23H2 Edition (Server Core installation):[{'version': '10.0.25398.0', 'lessThan': '10.0.25398.1085', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 10 Version 1507:[{'version': '10.0.10240.0', 'lessThan': '10.0.10240.20751', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 10 Version 1607:[{'version': '10.0.14393.0', 'lessThan': '10.0.14393.7259', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2016:[{'version': '10.0.14393.0', 'lessThan': '10.0.14393.7259', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2016 (Server Core installation):[{'version': '10.0.14393.0', 'lessThan': '10.0.14393.7259', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2008 Service Pack 2:[{'version': '6.0.6003.0', 'lessThan': '6.0.6003.22825', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2008 Service Pack 2 (Server Core installation):[{'version': '6.0.6003.0', 'lessThan': '6.0.6003.22825', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2008 Service Pack 2:[{'version': '6.0.6003.0', 'lessThan': '6.0.6003.22825', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2008 R2 Service Pack 1:[{'version': '6.1.7601.0', 'lessThan': '6.1.7601.27277', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2008 R2 Service Pack 1 (Server Core installation):[{'version': '6.1.7601.0', 'lessThan': '6.1.7601.27277', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2012:[{'version': '6.2.9200.0', 'lessThan': '6.2.9200.25031', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2012 (Server Core installation):[{'version': '6.2.9200.0', 'lessThan': '6.2.9200.25031', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2012 R2:[{'version': '6.3.9600.0', 'lessThan': '6.3.9600.22134', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows Server 2012 R2 (Server Core installation):[{'version': '6.3.9600.0', 'lessThan': '6.3.9600.22134', 'versionType': 'custom', 'status': 'affected'}],Microsoft:Windows 11 Version 24H2:[{'version': '10.0.26100.0', 'lessThan': '10.0.26100.1457', 'versionType': 'custom', 'status': 'affected'}]
Date Published
2024-08-13T17:29:58.392Z
Last Updated
2025-05-02T23:29:08.476Z