CVE-2024-21302
概要

Summary:
Microsoft was notified that an elevation of privilege vulnerability exists in Windows based systems supporting Virtualization Based Security (VBS), including a subset of Azure Virtual Machine SKUS. This vulnerability enables an attacker with administrator privileges to replace current versions of Windows system files with outdated versions. By exploiting this vulnerability, an attacker could reintroduce previously mitigated vulnerabilities, circumvent some features of VBS, and exfiltrate data protected by VBS.
Microsoft is developing a security update to mitigate this threat, but it is not yet available. Guidance to help customers reduce the risks associated with this vulnerability and to protect their systems until the mitigation is available in a Windows security update is provided in the Recommended Actions section of this CVE.
This CVE will be updated when the mitigation is available in a Windows security update. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert when this update occurs.
Update: August 13, 2024
Microsoft has released the August 2024 security updates that include an opt-in revocation policy mitigation to address this vulnerability. Customers running affected versions of Windows are encouraged to review KB5042562: Guidance for blocking rollback of virtualization-based security related updates to assess if this opt-in policy meets the needs of their environment before implementing this mitigation. There are risks associated with this mitigation that should be understood prior to applying it to your systems. Detailed information about these risks is also available in KB5042562.
Details:
A security researcher informed Microsoft of an elevation of privilege vulnerability in Windows 10, Windows 11, Windows Server 2016, and higher based systems including Azure Virtual Machines (VM) that support VBS. For more information on Windows versions and VM SKUs supporting VBS, reference: Virtualization-based Security (VBS) | Microsoft Learn.
The vulnerability enables an attacker with administrator privileges on the target system to replace current Windows system files with outdated versions. Successful exploitation provides an attacker with the ability to reintroduce previously mitigated vulnerabilities, circumvent VBS security features, and exfiltrate data protected by VBS.
Microsoft is developing a security... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21302

公表日 2024年8月8日11:15
登録日 2024年8月8日16:00
最終更新日 2024年9月18日9:15
CVSS3.1 : MEDIUM
スコア 6.7
ベクター CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
攻撃元区分(AV) ローカル
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR)
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I)
可用性への影響(A)
影響を受けるソフトウェアの構成
構成1 以上 以下 より上 未満
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:* 10.0.10240.20710
cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:* 10.0.10240.20710
cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:* 10.0.17763.6189
cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:* 10.0.17763.6189
cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:* 10.0.20348.2655
cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:* 10.0.22000.3147
cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:* 10.0.19044.4780
cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:* 10.0.22621.4037
cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:* 10.0.19045.4780
cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:* 10.0.22631.4037
cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:* 10.0.25398.1085
cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:* 10.0.14393.7259
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:* 10.0.14393.7259
cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:* 10.0.14393.7259
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:* 10.0.26100.1457
cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:* 10.0.26100.1457
関連情報、対策とツール
共通脆弱性一覧

JVN脆弱性情報
マイクロソフトの複数の Microsoft Windows 製品における権限を昇格される脆弱性
タイトル マイクロソフトの複数の Microsoft Windows 製品における権限を昇格される脆弱性
概要

マイクロソフトの Microsoft Windows 10、Windows 11、Windows Server には、Windows Azure Virtual Machine SKUS に不備があるため、権限を昇格される脆弱性が存在します。

想定される影響 権限を昇格される可能性があります。 
対策

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

公表日 2024年8月7日0:00
登録日 2024年9月13日15:45
最終更新日 2024年9月13日15:45
影響を受けるシステム
マイクロソフト
Microsoft Windows 10 for x64-based Systems
Microsoft Windows 10 Version 1607 for 32-bit Systems
Microsoft Windows 10 Version 1607 for x64-based Systems
Microsoft Windows 10 Version 1809 for 32-bit Systems
Microsoft Windows 10 Version 1809 for ARM64-based Systems
Microsoft Windows 10 Version 1809 for x64-based Systems
Microsoft Windows 10 Version 21H2 for 32-bit Systems
Microsoft Windows 10 Version 21H2 for ARM64-based Systems
Microsoft Windows 10 Version 21H2 for x64-based Systems
Microsoft Windows 10 Version 22H2 for 32-bit Systems
Microsoft Windows 10 Version 22H2 for ARM64-based Systems
Microsoft Windows 10 Version 22H2 for x64-based Systems
Microsoft Windows 10 for 32-bit Systems
Microsoft Windows 11 version 21H2 for ARM64-based Systems
Microsoft Windows 11 version 21H2 for x64-based Systems
Microsoft Windows 11 Version 22H2 for ARM64-based Systems
Microsoft Windows 11 Version 22H2 for x64-based Systems
Microsoft Windows 11 Version 23H2 for ARM64-based Systems
Microsoft Windows 11 Version 23H2 for x64-based Systems
Microsoft Windows 11 Version 24H2 for ARM64-based Systems
Microsoft Windows 11 Version 24H2 for x64-based Systems
Microsoft Windows Server 2016 
Microsoft Windows Server 2016 (Server Core installation)
Microsoft Windows Server 2019 
Microsoft Windows Server 2019 (Server Core installation)
Microsoft Windows Server 2022 
Microsoft Windows Server 2022 (Server Core installation)
Microsoft Windows Server 2022 , 23H2 Edition (Server Core installation)
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
変更履歴
No 変更内容 変更日
1 [2024年09月13日]
  掲載
2024年9月13日15:45