PT-2024-4172 · Microsoft · Windows +1
Carrot_C4K3
·
Published
2024-06-11
·
Updated
2025-07-26
·
CVE-2024-30088
7.0
High
Base vector | Vector | AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Microsoft Windows versions prior to June 11, 2024
Microsoft Windows 10 1507 (<10.0.10240.20680)
Microsoft Windows Server 2019
Microsoft Windows 10 22H2 (19045)
Xbox SystemOS
**Description:**
This vulnerability is a Windows kernel elevation of privilege flaw stemming from an error in the implementation of `NtQueryInformationToken`. Successful exploitation allows an attacker to gain SYSTEM-level privileges. The vulnerability is actively exploited in the wild by the Iranian threat actor OilRig (also known as APT34 and Helix Kitten) in attacks targeting the UAE and Gulf region, often in conjunction with the deployment of backdoors like Helminth, QUADAGENT, ISMAgent, and STEALHOOK. OilRig utilizes this vulnerability to compromise critical infrastructure, including government, technology, energy, and telecommunications sectors. The vulnerability has also been leveraged in attacks against Microsoft Exchange servers to steal credentials. A public exploit is available. Approximately an estimated number of devices worldwide are potentially affected, though a precise figure is not available.
**Recommendations:**
Microsoft Windows versions prior to June 11, 2024: Update to the latest version to address the vulnerability.
Microsoft Windows 10 1507 (<10.0.10240.20680): Update to a version newer than 10.0.10240.20680 to address the vulnerability.
Microsoft Windows Server 2019: Update to the latest version to address the vulnerability.
Microsoft Windows 10 22H2 (19045): Update to the latest version to address the vulnerability.
Xbox SystemOS: Update to the latest version to address the vulnerability.
Exploit
Fix
LPE
Time Of Check To Time Of Use
Weakness Enumeration
Related Identifiers
Affected Products
References · 96
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2024_30088_authz_basep.rb⭐ 35019 🔗 14201 · Exploit
- 🔥 https://github.com/exploits-forsale/collateral-damage⭐ 445 🔗 29 · Exploit
- 🔥 https://github.com/tykawaii98/CVE-2024-30088⭐ 246 🔗 54 · Exploit
- 🔥 https://github.com/Zombie-Kaiser/CVE-2024-30088-Windows-poc⭐ 36 🔗 15 · Exploit
- 🔥 https://github.com/NextGenPentesters/CVE-2024-30088-⭐ 6 🔗 1 · Exploit
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30088 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2024-30088 · Security Note
- https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2024-30088 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30088 · Vendor Advisory
- https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2024-30088 · Vendor Advisory
- https://zerodayinitiative.com/advisories/ZDI-24-606 · Security Note
- https://bdu.fstec.ru/vul/2024-04657 · Security Note
- https://github.com/aaaddress1/RunPE-In-Memory⭐ 863 🔗 170 · Note
- https://twitter.com/Raj_Samani/status/1838469569922433453 · Twitter Post
- https://twitter.com/DMFezzaReed/status/1846202122481627567 · Twitter Post