Skip to content

Microsoft Vulnerability Known Exploitation - 20240906002

Overview

The WA SOC has been made aware of active exploitation of published analysis and proof-of-concept (PoC) exploit for a critical zero-day vulnerability in the Windows Kernel. The vulnerability resides in the core of the Windows operating system, specifically within the ntoskrnl.exe process, also known as the Windows NT Operating System Kernel Executable. Successful exploitation could elevate their privileges to the SYSTEM level, effectively gaining full control over the targeted machine.

What is vulnerable?

Product(s) Affected Affected Version(s) CVE CVSS Severity
Windows 11, 10
Windows Server 2022, 2019, 2016
Vendor list of affected products and versions CVE-2024-38106 7.0 High

What has been observed?

There are reports of active exploitation in the wild. However, there is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer Patch Management):

Additional References