According to The Verge, the following vulnerabilities can affect approximately one billion devices. Any users with outdated versions of Windows are potentially at risk.
Microsoft Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43573 (CVSS 6.5, medium severity)
This vulnerability in the MSHTML platform of the Windows operating system could lead to the unauthorized disclosure of confidential data. Exploitation of the vulnerability first requires specific actions from a user. Attackers can achieve this with malicious attachments or links leading to fake resources in phishing emails.
Signs of exploitation: documented exploitation from Microsoft. CISA also added the vulnerability to its Known Exploited Vulnerabilities Catalog.
Potential number of victims: all Windows users (including Windows Server) who haven't installed the latest version.
Publicly available exploits: not available in open sources.
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-35250 (CVSS 7.8, high severity)
An attacker who successfully exploits this vulnerabilty could gain maximum SYSTEM privileges by manipulating the IOCTL_KS_PROPERTY request in the ks.sys kernel driver. After gaining full control of a host, they can then follow through on the next attack stages and carry out any actions as a local administrator, including install malware, modify or delete important files, and gain access to confidential data.
Signs of exploitation: Microsoft does not confirm any successful exploitations of the vulnerability.
Potential number of victims: all Windows users (including Windows Server) who haven't downloaded the latest security updates.
Publicly available exploits: the PoC was published with open access.
Windows Kernal Streaming Service Elevation of Privilege Vulnerability
CVE-2024-30090 (CVSS 7.0, high severity)
The vulnerability allows attackers to escalate privileges by manipulating IOCTL requests1. Windows uses Kernel Streaming to handle data streams from webcams, microphones, and other audio devices. Improper event handling during request conversion from 32-bit to 64-bit lets attackers exploit an error pattern to gain kernel mode access and SYSTEM privileges (similar to CVE-2024-35250). Successful exploitation of this vulnerability requires an attacker to win a race condition2.
Signs of exploitation: Microsoft does not confirm any successful exploitations of the vulnerability.
Potential number of victims: all Windows users (including Windows Server) who haven't downloaded the latest security updates.
Publicly available exploits: the PoC was published with open access.
How to eliminate the vulnerabilities in this digest: download security updates from the following official Microsoft pages: CVE-2024-43573, CVE-2024-35250, and CVE-2024-30090.