First published: Tue Jul 09 2024(Updated: )
Windows Kernel Information Disclosure Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Windows 11 | =23H2 | |
Windows 11 | =22H2 | |
Windows 11 | =22H2 | |
Windows 11 | =21H2 | |
Windows 11 | =21H2 | |
Windows 11 | =23H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 10 | <10.0.14393.7159 | |
Microsoft Windows 10 | <10.0.17763.6054 | |
Microsoft Windows 10 | <10.0.19044.4651 | |
Microsoft Windows 10 | <10.0.19045.4651 | |
Windows 11 | <10.0.22000.3079 | |
Windows 11 | <10.0.22621.3880 | |
Windows 11 | <10.0.22631.3880 | |
Microsoft Windows Server 2016 | <10.0.14393.7159 | |
Microsoft Windows Server 2019 | <10.0.17763.6054 | |
Microsoft Windows Server 2022 | <10.0.20348.2582 | |
Microsoft Windows Server 2022 | <10.0.25398.1009 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2016 | ||
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =1809 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =22H2 | |
Windows 10 | =1607 | |
Windows 10 | =1607 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 | |
Windows 10 | =21H2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38041 is classified as a critical vulnerability that can lead to information disclosure in the Windows kernel.
To fix CVE-2024-38041, apply the relevant security patches available for your affected Windows operating systems.
CVE-2024-38041 affects multiple versions including Windows Server 2016, Windows Server 2019, Windows 10 (multiple versions), and Windows 11 (multiple versions).
Yes, CVE-2024-38041 can potentially be exploited remotely if an attacker has access to the vulnerable system.
Exploitation of CVE-2024-38041 may allow an attacker to access sensitive information from the affected system.