Skip to main content

CVE-2024-26238: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 21H2

High
VulnerabilityCVE-2024-26238cvecve-2024-26238cwe-59
Published: Tue May 14 2024 (05/14/2024, 16:57:18 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 21H2

Description

Microsoft PLUGScheduler Scheduled Task Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 03:13:18 UTC

Technical Analysis

CVE-2024-26238 is a high-severity vulnerability affecting Microsoft Windows 10 Version 21H2 (build 10.0.19043.0). It is classified under CWE-59, which pertains to improper link resolution before file access, commonly known as a 'link following' vulnerability. The flaw exists in the Microsoft PLUGScheduler Scheduled Task component, which is responsible for managing scheduled tasks within the Windows operating system. The vulnerability allows an attacker with limited privileges (local access with low privileges) to exploit improper symbolic link or junction resolution when the system accesses files related to scheduled tasks. This improper handling can lead to an elevation of privilege, enabling the attacker to gain higher system privileges than originally granted. The CVSS v3.1 base score is 7.8, reflecting a high severity due to the combination of local attack vector (AV:L), low attack complexity (AC:L), and the requirement for low privileges (PR:L) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated high (C:H/I:H/A:H), indicating that successful exploitation could allow full system compromise, including unauthorized access to sensitive data, modification of system files, and disruption of system availability. The scope remains unchanged (S:U), meaning the vulnerability affects only the vulnerable component without impacting other components. No known exploits are currently reported in the wild, and no official patches or mitigation links are provided yet. The vulnerability was reserved in February 2024 and published in May 2024, indicating recent discovery and disclosure. Given the nature of the vulnerability, it is likely exploitable by local attackers who have some access to the system but seek to escalate privileges to administrative or SYSTEM level, potentially enabling further malicious activities such as persistence, lateral movement, or deployment of malware.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Windows 10 Version 21H2 is widely deployed. The ability for a low-privileged local user to escalate privileges can lead to full system compromise, undermining the confidentiality, integrity, and availability of critical systems. This is particularly concerning for sectors with sensitive data or critical infrastructure, such as finance, healthcare, government, and manufacturing. Attackers could leverage this vulnerability to bypass security controls, deploy ransomware, or exfiltrate sensitive information. The lack of required user interaction and the low complexity of exploitation increase the risk of internal threat actors or malware gaining elevated privileges. Additionally, organizations relying on scheduled tasks for automation and system management may find these tasks compromised, leading to operational disruptions. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score and potential impact necessitate urgent attention to prevent exploitation.

Mitigation Recommendations

1. Immediate deployment of any forthcoming official patches from Microsoft should be prioritized once available. 2. Until patches are released, restrict local user permissions to the minimum necessary, particularly limiting access to scheduled task management and related file system locations. 3. Implement strict monitoring and auditing of scheduled task creation, modification, and execution activities to detect anomalous behavior indicative of exploitation attempts. 4. Use application whitelisting and endpoint protection solutions to prevent unauthorized execution of code that could leverage this vulnerability. 5. Employ enhanced file system permissions and integrity monitoring on directories and files associated with scheduled tasks to detect and prevent unauthorized symbolic link creation or manipulation. 6. Conduct regular vulnerability scanning and system inventory to identify systems running the affected Windows 10 version and prioritize them for remediation. 7. Educate internal users about the risks of local privilege escalation and enforce policies to minimize the risk of insider threats. 8. Consider network segmentation and least privilege principles to limit the impact of a compromised local account. These steps go beyond generic advice by focusing on controlling the specific attack vector (link following in scheduled tasks) and enhancing detection capabilities around scheduled task operations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-02-15T00:57:49.358Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb534

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:13:18 AM

Last updated: 7/26/2025, 12:02:49 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats