First published: Tue Sep 10 2024(Updated: )
Microsoft Windows Installer contains an improper privilege management vulnerability that could allow an attacker to gain SYSTEM privileges.
Credit: secure@microsoft.com secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows 11 | =23H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 10 | =1607 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =23H2 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 11 | =24H2 | |
Microsoft Windows 10 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows 11 | =24H2 | |
Microsoft Windows 10 | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows 10 1507 | <10.0.10240.20766 | |
Microsoft Windows 10 1507 | <10.0.10240.20766 | |
Microsoft Windows 10 Version 1607 x86 | <10.0.14393.7336 | |
Microsoft Windows 10 Version 1607 x86 | <10.0.14393.7336 | |
Microsoft Windows 10 1809 | <10.0.17763.6293 | |
Microsoft Windows 10 21h2 | <10.0.19044.4894 | |
Microsoft Windows 10 22h2 | <10.0.19045.4894 | |
Microsoft Windows 11 21h2 | <10.0.22000.3197 | |
Microsoft Windows 11 22h2 | <10.0.22621.4169 | |
Microsoft Windows 11 23h2 | <10.0.22631.4169 | |
Microsoft Windows 11 Home Edition | <10.0.26100.1742 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | <10.0.14393.7336 | |
Microsoft Windows Server 2019 | <10.0.17763.6293 | |
Microsoft Windows Server 2022 | <10.0.20348.2700 | |
Microsoft Windows Server 2022 23H2 | <10.0.25398.1128 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38014 has a high severity rating as it can allow an attacker to gain SYSTEM privileges.
To fix CVE-2024-38014, apply the latest security updates and patches provided by Microsoft for the affected versions.
CVE-2024-38014 affects various versions of Windows, including Windows 10, Windows 11, and Windows Server 2008 and later.
Yes, CVE-2024-38014 can be exploited remotely, potentially allowing attackers to execute arbitrary commands with elevated privileges.
While no formal workarounds are recommended, limiting access to the affected systems may reduce exposure to CVE-2024-38014.