First published: Tue Oct 08 2024(Updated: )
Windows Netlogon Elevation of Privilege Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2008 R2 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2022 23H2 | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =sp2 | |
Microsoft Windows Server 2008 Itanium | =r2-sp1 | |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | <10.0.14393.7428 | |
Microsoft Windows Server 2019 | <10.0.17763.6414 | |
Microsoft Windows Server 2022 | <10.0.20348.2762 | |
Microsoft Windows Server 2022 23H2 | <10.0.25398.1189 | |
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium | ||
Microsoft Windows Server 2008 Itanium |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38124 has been classified as an elevation of privilege vulnerability affecting Windows Netlogon.
To fix CVE-2024-38124, apply the security patches provided by Microsoft for the affected Windows Server versions.
CVE-2024-38124 affects several versions, including Windows Server 2008, 2012, 2016, 2019, and 2022.
Exploitation of CVE-2024-38124 could allow an attacker to elevate their privileges and gain access to sensitive system resources.
Currently, the recommended mitigation for CVE-2024-38124 is to apply the latest security updates as no official workarounds are provided.