CVE-2024-49138

ENISA EUVD: EUVD-2024-43765 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 4 articles Published: 2024-12-10

EPSS Score

Source: FIRST.org · 2026-05-23
85.84%
probability
This CVE has a 85.84% probability of being exploited in the next 30 days.
0% Top 99.4th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Unproven
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C

Description

NVD
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Affected Products

Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0
Microsoft
Windows 10 Version 21H2
10.0.19043.0

Attack Intelligence

Google Project Zero

Patched
Dec. 10, 2024
Reported by
Advanced Research Team with CrowdStrike
Root Cause Analysis
???

Exploits & PoC

MrAle98/CVE-2024-49138-POC

POC exploit for CVE-2024-49138

269 2025-02-14
Zedocun/soc-investigation-powershell-edrfreeze

SOC investigation of CVE-2024-49138 exploitation alert involving PowerShell, EDRFreeze execution, and defense evasion behavior in a simulated environm

1 2026-03-09
CyprianAtsyor/letsdefend-cve-2024-49138-investigation

Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT.

0 2025-04-23
onixgod/SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup

In this lab I walked through an end-to-end intrusion that began with an external RDP break-in, used a brand-new CLFS privilege-escalation exploit (CVE

0 2025-06-12
8 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
82%
EPSS 85.84%
CVSS v3.1 7.8
Mentions 4
Last Seen Dec 10, 2024

CNA Information

CNA Assigner
microsoft
CNA Title
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Analyst Note

CVE-2024-49138 is confirmed as an elevation of privilege vulnerability in Windows CLFS driver with a HIGH CVSS score (7.8), reported by Google Project Zero, and addressed in Microsoft's December 2024 Patch Tuesday. The vulnerability's confirmation by a reputable security researcher group and its inclusion in official patch releases provide strong evidence supporting the CONFIRMED status, though the lack of CISA KEV listing suggests limited evidence of active exploitation at the time of assessment.

Threat Actors 10

Hacking Team
apt_group 🇮🇹 IT
Group 27
apt_group Information theft and espionage 🇨🇳 CN
Anonymous Sudan
apt_group 🇸🇩 SD
APT 22
apt_group Information theft and espionage 🇨🇳 CN
Rocke
apt_group 🇨🇳 CN
APT 6
apt_group Information theft and espionage 🇨🇳 CN
Red Dev 17
apt_group 🇨🇳 CN
Red October
apt_group 🇷🇺 RU
Mana Team
apt_group 🇨🇳 CN
APT 5
apt_group Information theft and espionage 🇨🇳 CN

Triage Info

Decided atMar 03, 2026
Published DateDec 10, 2024