CVE-2024-38193
ENISA EUVD: EUVD-2024-37161 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
8 articles
Published: 2024-08-13
EPSS Score
Source: FIRST.org · 2026-05-23
73.23%
probability
This CVE has a 73.23% probability
of being exploited in the next 30 days.
0%
Top 98.8th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Description
NVDWindows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Affected Products
Microsoft
Windows 11 Version 24H2
10.0.26100.0
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Google Project Zero
Patched
Aug. 13, 2024
Reported by
Luigino Camastra and Milánek with Gen Digital
Root Cause Analysis
???
Exploits & PoC
59
2024-11-18
1 repo — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
92%
EPSS
73.23%
CVSS v3.1
7.8
Mentions
8
Last Seen
Aug 30, 2024
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Analyst Note
CVE-2024-38193 is confirmed as a high-severity Windows elevation of privilege vulnerability patched in Microsoft's August 2024 Patch Tuesday update. The vulnerability has been documented in Google Project Zero and associated articles indicate active exploitation by advanced threat actors (Lazarus group) to deploy rootkits, providing strong evidence of real-world impact.
Threat Actors 20
MuddyWater
apt_group
Information theft and espionage
🇮🇷 IR
Lazarus Group
apt_group
Information theft and espionage
🇰🇵 KP
Cobalt
apt_group
Financial crime
🇷🇺 RU
APT37
apt_group
Information theft and espionage
🇰🇵 KP
APT 28
apt_group
Information theft and espionage
🇷🇺 RU
Kimsuky
apt_group
Information theft and espionage
🇰🇷 KR
CHRYSENE
apt_group
Information theft and espionage
🇮🇷 IR
Harvester
apt_group
Information theft and espionage
Unknown
Hacking Team
apt_group
🇮🇹 IT
The Shadow Brokers
apt_group
🇷🇺 RU
UAC-0020
apt_group
🇺🇦 UA
Infy
apt_group
Information theft and espionage
🇮🇷 IR
SideWinder
apt_group
🇮🇳 IN
RAZOR TIGER
apt_group
Information theft and espionage
🇮🇳 IN
FASTCash
apt_group
Information theft and espionage
🇰🇵 KP
Larva-208
apt_group
🇷🇺 RU
TraderTraitor
apt_group
🇰🇵 KP
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
UNC2891
apt_group
Financial gain
🇨🇳 CN
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Triage Info
Decided atMar 03, 2026
Published DateAug 13, 2024