Known Exploited Vulnerability
7.8
HIGH CVSS 3.1
CVE-2024-38193
Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability - [Actively Exploited]
Description

Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

INFO

Published Date :

Aug. 13, 2024, 6:15 p.m.

Last Modified :

May 13, 2025, 6:19 p.m.

Remotely Exploit :

No
CISA Notification
CISA KEV (Known Exploited Vulnerabilities)

For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—CISA maintains the authoritative source of vulnerabilities that have been exploited in the wild.

Description :

Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.

Required Action :

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Notes :

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193; https://nvd.nist.gov/vuln/detail/CVE-2024-38193

Affected Products

The following products are affected by CVE-2024-38193 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Microsoft windows_server_2008
2 Microsoft windows_server_2012
3 Microsoft windows_server_2016
4 Microsoft windows_server_2019
5 Microsoft windows_10_1607
6 Microsoft windows_10_1809
7 Microsoft windows_10_21h2
8 Microsoft windows_10_22h2
9 Microsoft windows_server_2022
10 Microsoft windows_11_21h2
11 Microsoft windows_11_22h2
12 Microsoft windows_10_1507
13 Microsoft windows
14 Microsoft windows_11_23h2
15 Microsoft windows_server_2022_23h2
16 Microsoft windows_server_23h2
17 Microsoft windows_server_2012_r2
18 Microsoft windows_server_2008_r2
19 Microsoft windows_server_2008_sp2
20 Microsoft windows_11_24h2
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
Solution
A vulnerability exists in Microsoft Windows that could allow for privilege escalation.
  • Apply the appropriate security update to address the vulnerability.
  • Reboot the system if prompted.
Public PoC/Exploit Available at Github

CVE-2024-38193 has a 2 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2024-38193.

URL Resource
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193 Patch Vendor Advisory
https://www.exploit-db.com/exploits/52284 Exploit
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2024-38193 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2024-38193 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

C++

Updated: 3 months, 1 week ago
58 stars 25 fork 25 watcher
Born at : Dec. 3, 2024, 8:56 a.m. This repo has been linked 1 different CVEs too.

None

C++

Updated: 8 months, 3 weeks ago
3 stars 0 fork 0 watcher
Born at : Nov. 18, 2024, 11:34 p.m. This repo has been linked 1 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2024-38193 vulnerability anywhere in the article.

  • TheCyberThrone
CVE-2025-49763 — Apache Traffic Server ESI Memory Exhaustion Flaw

CVE-2025-49763 is a denial-of-service (DoS) vulnerability found in Apache Traffic Server (ATS), specifically within its Edge Side Includes (ESI) plugin. The flaw stems from insufficient restrictions o ... Read more

Published Date: Jun 19, 2025 (2 months ago)
  • TheCyberThrone
TheCyberThrone CyberSecurity Newsletter Top 5 Articles – February 2025

Welcome to TheCyberThrone cybersecurity month in review will be posted covering the important security happenings . This review is for the month ending February 2025Subscribers favorite #1CVE-2025-109 ... Read more

Published Date: Mar 02, 2025 (5 months, 3 weeks ago)
  • The Hacker News
Microsoft’s Patch Tuesday Fixes 63 Flaws, Including Two Under Active Exploitation

Patch Tuesday / Vulnerability Microsoft on Tuesday released fixes for 63 security flaws impacting its software products, including two vulnerabilities that it said has come under active exploitation i ... Read more

Published Date: Feb 12, 2025 (6 months, 1 week ago)
  • krebsonsecurity.com
Microsoft Patch Tuesday, February 2025 Edition

Microsoft today issued security updates to fix at least 56 vulnerabilities in its Windows operating systems and supported software, including two zero-day flaws that are being actively exploited. All ... Read more

Published Date: Feb 12, 2025 (6 months, 1 week ago)
  • Help Net Security
Microsoft fixes two actively exploited zero-days (CVE-2025-21418, CVE-2025-21391)

February 2025 Patch Tuesday is here, and Microsoft has delivered fixes for 56 vulnerabilities, including two zero-days – CVE-2025-21418 and CVE-2025-21391 – under active exploitation. CVE-2025-21418 a ... Read more

Published Date: Feb 11, 2025 (6 months, 1 week ago)
  • TheCyberThrone
CISA Warns on Contec CM8000 having a Backdoor

The Contec CM8000 patient monitor has been identified as having critical vulnerabilities, specifically backdoor functionalities, which pose significant risks to patient safety and data privacy. Here i ... Read more

Published Date: Feb 03, 2025 (6 months, 3 weeks ago)
  • TheCyberThrone
TheCyberThrone Security Weekly Review – February 01, 2025

Welcome to TheCyberThrone  cybersecurity week in review will be posted covering the important security happenings. This review is for the week ending Saturday, February 01, 2025.Cyber Incidents at Tat ... Read more

Published Date: Feb 03, 2025 (6 months, 3 weeks ago)
  • TheCyberThrone
TheCyberThrone CyberSecurity Newsletter Top 5 Articles – January 2025

Welcome to TheCyberThrone cybersecurity month in review will be posted covering the important security happenings . This review is for the month ending January 2025Subscribers favorite #1Exploit Code ... Read more

Published Date: Feb 01, 2025 (6 months, 3 weeks ago)
  • TheCyberThrone
CVE-2024-53299 impacts Apache Wicket

BackgroundCVE-2024-53299 is a significant security vulnerability identified in Apache Wicket, specifically impacting versions prior to 9.19.0 and 10.3.0. This vulnerability allows attackers to initiat ... Read more

Published Date: Jan 26, 2025 (6 months, 4 weeks ago)
  • TheCyberThrone
TheCyberThrone Security BiWeekly Review – January 25, 2025

Welcome to TheCyberThrone. Cybersecurity week in review will be posted covering the important security happenings. This review is for the bi-weekly ending on Saturday, January 25, 2025.CVE-2025-0411 i ... Read more

Published Date: Jan 26, 2025 (6 months, 4 weeks ago)
  • TheCyberThrone
CVE-2024-53691: PoC Exploit Code Release for QNAP Flaw

CVE-2024-53691 is a severe remote code execution (RCE) vulnerability discovered in QNAP NAS devices. Recently, security researcher c411e released a Proof-of-Concept (PoC) exploit code, underscoring th ... Read more

Published Date: Jan 20, 2025 (7 months ago)
  • TheCyberThrone
CVE-2025-23082 impacts Veeam Backup for Microsoft Azure

CVE-2025-23082 is a high-severity security vulnerability identified in Veeam Backup for Microsoft Azure, a solution designed to protect workloads running in Microsoft’s Azure cloud environment. This v ... Read more

Published Date: Jan 17, 2025 (7 months, 1 week ago)
  • TheCyberThrone
CVE-2024-54498: Exploit Code Released for macOS Flaw

OverviewCVE-2024-54498 is a critical vulnerability affecting macOS systems, specifically those running versions prior to 2.6.11. This vulnerability, discovered by security researcher @wh1te4ever, invo ... Read more

Published Date: Jan 13, 2025 (7 months, 1 week ago)
  • TheCyberThrone
TheCyberThrone Security Weekly Review – January 11, 2025

Welcome to TheCyberThrone cybersecurity week in review will be posted covering the important security happenings. This review is for the week ending Saturday, January 11, 2025.Redis was affected by CV ... Read more

Published Date: Jan 12, 2025 (7 months, 1 week ago)
  • TheCyberThrone
CVE-2024-49415 : Samsung Android devices Impacted

CVE-2024-49415 is a critical vulnerability found in Samsung devices running Android versions 12, 13, and 14. This vulnerability was discovered by researchers from Google Project Zero, a team dedicated ... Read more

Published Date: Jan 11, 2025 (7 months, 1 week ago)
  • TheCyberThrone
CVE-2024-53704 impacts SonicWall

CVE-2024-53704 is a high-severity vulnerability impacting SonicWall’s SSLVPN authentication mechanism. This flaw, with a CVSS score of 8.2, allows remote attackers to bypass authentication and gain un ... Read more

Published Date: Jan 11, 2025 (7 months, 1 week ago)
  • TheCyberThrone
CVE-2024-12847: Proof-of-Concept Exploit Code Released

OverviewCVE-2024-12847 is a critical security vulnerability affecting certain models of NETGEAR routers, notably the DGN1000 and DGN2200 v1. This vulnerability has been assigned a CVSS score of 9.8, r ... Read more

Published Date: Jan 11, 2025 (7 months, 1 week ago)
  • TheCyberThrone
CVE-2025-0282: Affecting Ivanti Products

OverviewCVE-2025-0282 is a critical stack-based buffer overflow vulnerability. It impacts Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for Zero Trust Access (ZTA) gateways. This vul ... Read more

Published Date: Jan 09, 2025 (7 months, 2 weeks ago)
  • Cybersecurity News
From Fake Installers to Stolen Credentials: Decoding the LegionLoader Threat

TRAC Labs has released an in-depth report on LegionLoader, a sophisticated downloader malware that has evolved significantly since its initial appearance in 2019. The malware, also tracked as Satacom, ... Read more

Published Date: Jan 02, 2025 (7 months, 3 weeks ago)
  • TheCyberThrone
Microsoft Patch Tuesday Year 2024 Analysis

In 2024, Microsoft’s Patch Tuesday updates played a critical role in addressing security vulnerabilities across various platforms. Throughout the year, a total of 1,000+ vulnerabilities were patched, ... Read more

Published Date: Dec 25, 2024 (7 months, 4 weeks ago)

The following table lists the changes that have been made to the CVE-2024-38193 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Modified Analysis by [email protected]

    May. 13, 2025

    Action Type Old Value New Value
    Added Reference Type CVE: https://www.exploit-db.com/exploits/52284 Types: Exploit
  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    May. 09, 2025

    Action Type Old Value New Value
    Added Reference https://www.exploit-db.com/exploits/52284
  • Initial Analysis by [email protected]

    Aug. 14, 2024

    Action Type Old Value New Value
    Changed Reference Type https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193 No Types Assigned https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193 Patch, Vendor Advisory
    Added CWE NIST NVD-CWE-noinfo
    Added CPE Configuration OR *cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.10240.20751 *cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.14393.7259 *cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.6189 *cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19044.4780 *cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.19045.4780 *cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22000.3147 *cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22621.4037 *cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.22631.4037 *cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.26100.1457 *cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* *cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:* versions up to (excluding) 6.2.9200.25031 *cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:* *cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.14393.7259 *cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.17763.6189 *cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.20348.2655 *cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* versions up to (excluding) 10.0.25398.1085
  • CVE CISA KEV Update by 9119a7d8-5eab-497f-8521-727c672e3725

    Aug. 14, 2024

    Action Type Old Value New Value
    Added Vulnerability Name Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability
    Added Due Date 2024-09-03
    Added Date Added 2024-08-13
    Added Required Action Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • CVE Received by [email protected]

    Aug. 13, 2024

    Action Type Old Value New Value
    Added Description Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
    Added Reference Microsoft Corporation https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38193 [No types assigned]
    Added CWE Microsoft Corporation CWE-416
    Added CVSS V3.1 Microsoft Corporation AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
Vulnerability Scoring Details
Base CVSS Score: 7.8
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact