CVE-2024-49138
ENISA EUVD: EUVD-2024-43765 ↗
Exploited in the Wild
✓ Confirmed 0-Day
★ Google Project Zero
Triaged: March 3, 2026
4 articles
Published: 2024-12-10
EPSS Score
Source: FIRST.org · 2026-05-23
85.84%
probability
This CVE has a 85.84% probability
of being exploited in the next 30 days.
0%
Top 99.4th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Description
NVDWindows Common Log File System Driver Elevation of Privilege Vulnerability
Affected Products
Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0
Microsoft
Windows 10 Version 21H2
10.0.19043.0
Attack Intelligence
Google Project Zero
Patched
Dec. 10, 2024
Reported by
Advanced Research Team with CrowdStrike
Root Cause Analysis
???
Exploits & PoC
MrAle98/CVE-2024-49138-POC
POC exploit for CVE-2024-49138
269
2025-02-14
Zedocun/soc-investigation-powershell-edrfreeze
SOC investigation of CVE-2024-49138 exploitation alert involving PowerShell, EDRFreeze execution, and defense evasion behavior in a simulated environm
1
2026-03-09
0
2025-01-21
CyprianAtsyor/letsdefend-cve-2024-49138-investigation
Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT.
0
2025-04-23
onixgod/SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup
In this lab I walked through an end-to-end intrusion that began with an external RDP break-in, used a brand-new CLFS privilege-escalation exploit (CVE
0
2025-06-12
0
2026-04-04
8 repos — triés par ⭐
Rechercher sur GitHub ↗
Signal Intelligence
Confidence
82%
EPSS
85.84%
CVSS v3.1
7.8
Mentions
4
Last Seen
Dec 10, 2024
CNA Information
CNA Assigner
microsoft
CNA Title
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Analyst Note
CVE-2024-49138 is confirmed as an elevation of privilege vulnerability in Windows CLFS driver with a HIGH CVSS score (7.8), reported by Google Project Zero, and addressed in Microsoft's December 2024 Patch Tuesday. The vulnerability's confirmation by a reputable security researcher group and its inclusion in official patch releases provide strong evidence supporting the CONFIRMED status, though the lack of CISA KEV listing suggests limited evidence of active exploitation at the time of assessment.
Threat Actors 10
Hacking Team
apt_group
🇮🇹 IT
Group 27
apt_group
Information theft and espionage
🇨🇳 CN
Anonymous Sudan
apt_group
🇸🇩 SD
APT 22
apt_group
Information theft and espionage
🇨🇳 CN
Rocke
apt_group
🇨🇳 CN
APT 6
apt_group
Information theft and espionage
🇨🇳 CN
Red Dev 17
apt_group
🇨🇳 CN
Red October
apt_group
🇷🇺 RU
Mana Team
apt_group
🇨🇳 CN
APT 5
apt_group
Information theft and espionage
🇨🇳 CN
Triage Info
Decided atMar 03, 2026
Published DateDec 10, 2024