CVE-2024-38193

ENISA EUVD: EUVD-2024-37161 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 8 articles Published: 2024-08-13

EPSS Score

Source: FIRST.org · 2026-05-23
73.23%
probability
This CVE has a 73.23% probability of being exploited in the next 30 days.
0% Top 98.8th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Description

NVD
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Affected Products

Microsoft
Windows 11 Version 24H2
10.0.26100.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0

Attack Intelligence

Google Project Zero

Patched
Aug. 13, 2024
Reported by
Luigino Camastra and Milánek with Gen Digital
Root Cause Analysis
???

Signal Intelligence

Confidence
92%
EPSS 73.23%
CVSS v3.1 7.8
Mentions 8
Last Seen Aug 30, 2024

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Analyst Note

CVE-2024-38193 is confirmed as a high-severity Windows elevation of privilege vulnerability patched in Microsoft's August 2024 Patch Tuesday update. The vulnerability has been documented in Google Project Zero and associated articles indicate active exploitation by advanced threat actors (Lazarus group) to deploy rootkits, providing strong evidence of real-world impact.

Threat Actors 20

MuddyWater
apt_group Information theft and espionage 🇮🇷 IR
Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP
Cobalt
apt_group Financial crime 🇷🇺 RU
APT37
apt_group Information theft and espionage 🇰🇵 KP
APT 28
apt_group Information theft and espionage 🇷🇺 RU
Kimsuky
apt_group Information theft and espionage 🇰🇷 KR
CHRYSENE
apt_group Information theft and espionage 🇮🇷 IR
Harvester
apt_group Information theft and espionage Unknown
Hacking Team
apt_group 🇮🇹 IT
The Shadow Brokers
apt_group 🇷🇺 RU
UAC-0020
apt_group 🇺🇦 UA
Infy
apt_group Information theft and espionage 🇮🇷 IR
SideWinder
apt_group 🇮🇳 IN
RAZOR TIGER
apt_group Information theft and espionage 🇮🇳 IN
FASTCash
apt_group Information theft and espionage 🇰🇵 KP
Larva-208
apt_group 🇷🇺 RU
TraderTraitor
apt_group 🇰🇵 KP
APT 22
apt_group Information theft and espionage 🇨🇳 CN
UNC2891
apt_group Financial gain 🇨🇳 CN
APT 5
apt_group Information theft and espionage 🇨🇳 CN

Triage Info

Decided atMar 03, 2026
Published DateAug 13, 2024