Skip to main content

CVE-2024-38117: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 24H2

High
VulnerabilityCVE-2024-38117cvecve-2024-38117cwe-125
Published: Tue Aug 13 2024 (08/13/2024, 17:30:03 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 11 Version 24H2

Description

NTFS Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 03:13:14 UTC

Technical Analysis

CVE-2024-38117 is a high-severity vulnerability identified in Microsoft Windows 11 Version 24H2 (build 10.0.26100.0) that involves an out-of-bounds read condition within the NTFS file system driver. Classified under CWE-125, this vulnerability allows an attacker with limited privileges (local access with low privileges) to perform an elevation of privilege attack by exploiting improper bounds checking in the handling of NTFS metadata or file system structures. The vulnerability does not require user interaction and can be exploited locally, meaning an attacker must already have some level of access to the system but can then leverage this flaw to gain higher privileges, potentially SYSTEM-level access. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, as the attacker could read memory beyond intended boundaries, potentially leading to information disclosure, system instability, or execution of arbitrary code with elevated privileges. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation efforts should be prioritized. The vulnerability's attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), and scope unchanged (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This vulnerability is significant because NTFS is the primary file system for Windows, and exploitation could compromise the entire system security, allowing attackers to bypass security controls and gain full control over affected machines.

Potential Impact

For European organizations, this vulnerability poses a serious risk especially to enterprises and government institutions relying on Windows 11 Version 24H2 in their desktop and server environments. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within corporate networks. Confidentiality breaches could expose personal data protected under GDPR, leading to regulatory penalties and reputational damage. Integrity and availability impacts could disrupt business operations, affecting sectors such as finance, healthcare, and critical infrastructure. Since the exploit requires local access, insider threats or compromised endpoints could be leveraged to escalate privileges and deepen attacks. The lack of a patch at the time of disclosure increases the urgency for organizations to implement compensating controls to prevent exploitation. Given the widespread adoption of Windows 11 in Europe, the vulnerability could be leveraged in targeted attacks or ransomware campaigns, amplifying its impact on European digital ecosystems.

Mitigation Recommendations

1. Immediate mitigation should include restricting local access to trusted users only and enforcing strict endpoint security policies to prevent unauthorized local logins. 2. Deploy enhanced monitoring and alerting for suspicious privilege escalation attempts and anomalous NTFS file system activity. 3. Utilize application whitelisting and endpoint detection and response (EDR) solutions to detect and block exploitation attempts. 4. Apply the principle of least privilege rigorously to minimize the number of users with local access rights. 5. Until an official patch is released, consider isolating critical systems or using virtualization/containerization to limit the impact of potential exploitation. 6. Regularly update and audit system configurations and security controls to reduce attack surface. 7. Educate IT staff and users about the risks of local privilege escalation vulnerabilities and the importance of maintaining secure access controls. 8. Once Microsoft releases a patch, prioritize its deployment across all affected Windows 11 24H2 systems to remediate the vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.191Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb1dd

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 3:13:14 AM

Last updated: 8/2/2025, 4:25:50 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats