Jun 2024: Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-35250 Published on June 11, 2024
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
Known Exploited Vulnerability
This Microsoft Windows Kernel-Mode Driver Untrusted Pointer Dereference Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Kernel-Mode Driver contains an untrusted pointer dereference vulnerability that allows a local attacker to escalate privileges.
The following remediation steps are recommended / required by January 6, 2025: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Weakness Type
Untrusted Pointer Dereference
The program obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting pointer.
Products Associated with CVE-2024-35250
Want to know whenever a new CVE is published for Microsoft products? stack.watch will email you.
Affected Versions
Microsoft Windows 10 Version 1809:- Version 10.0.17763.0 and below 10.0.17763.5936 is affected.
- Version 10.0.0 and below 10.0.17763.5936 is affected.
- Version 10.0.17763.0 and below 10.0.17763.5936 is affected.
- Version 10.0.17763.0 and below 10.0.17763.5936 is affected.
- Version 10.0.20348.0 and below 10.0.20348.2527 is affected.
- Version 10.0.22000.0 and below 10.0.22000.3019 is affected.
- Version 10.0.19044.0 and below 10.0.19044.4529 is affected.
- Version 10.0.22621.0 and below 10.0.22621.3737 is affected.
- Version 10.0.19045.0 and below 10.0.19045.4529 is affected.
- Version 10.0.22631.0 and below 10.0.22631.3737 is affected.
- Version 10.0.22631.0 and below 10.0.22631.3737 is affected.
- Version 10.0.25398.0 and below 10.0.25398.950 is affected.
- Version 10.0.10240.0 and below 10.0.10240.20680 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7070 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7070 is affected.
- Version 10.0.14393.0 and below 10.0.14393.7070 is affected.
- Version 6.0.6003.0 and below 6.0.6003.22720 is affected.
- Version 6.0.6003.0 and below 6.0.6003.22720 is affected.
- Version 6.0.6003.0 and below 6.0.6003.22720 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27170 is affected.
- Version 6.1.7601.0 and below 6.1.7601.27170 is affected.
- Version 6.2.9200.0 and below 6.2.9200.24919 is affected.
- Version 6.2.9200.0 and below 6.2.9200.24919 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22023 is affected.
- Version 6.3.9600.0 and below 6.3.9600.22023 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.