Insight Type: Blog
Maidar Secure Advisory: Elevation of Privilege Vulnerability CVE-2024-21338 in Windows Kernel

Table of Contents

  • Overview of the Threat
  • Technical Details of the Vulnerability
  • Exploitation Methodology
  • Implications and Impact
  • Countermeasures and Recommendations
  • Conclusion
  • References
  • Contact Us

Overview of the Threat

The notorious Lazarus Group, associated with North Korean state interests, has recently exploited a zero-day vulnerability in the Windows Kernel, marked as CVE-2024-21338, to gain kernel-level access on compromised systems. This exploit grants them elevated privileges, enabling them to disable security software and perform other malicious activities.

Technical Details of the Vulnerability

  • CVE ID: CVE-2024-21338
  • CVSS Score: 7.8 (High)
  • Description: The vulnerability allows attackers to gain SYSTEM privileges by exploiting a flaw in the Windows Kernel.
  • Affected Systems: Windows 10, version 1703 (RS2/15063) and possibly others.

Exploitation Methodology

The Lazarus Group utilised a specially crafted application to exploit CVE-2024-21338, allowing them to take control of affected systems. This exploit involves manipulating the appid.sys driver, a component critical for the functioning of Windows AppLocker, thereby bypassing all security checks and running the FudModule rootkit.

Implications and Impact

  • Escalated Privileges: The exploit grants attackers SYSTEM privileges, providing them with extensive control over compromised systems.
  • Disabling Security Software: The FudModule rootkit deployed by Lazarus Group can disable various security solutions, including AhnLab V3 Endpoint Security, CrowdStrike Falcon, HitmanPro, and Microsoft Defender Antivirus.

Countermeasures and Recommendations

  • Apply Security Updates: Ensure that all systems are updated with the latest patches from Microsoft to mitigate the vulnerability.
  • Enhance Monitoring: Implement robust monitoring solutions to detect and respond to suspicious activities promptly.
  • Security Awareness: Educate users about phishing attacks and suspicious software installations to prevent initial system compromise.

Conclusion

The exploitation of CVE-2024-21338 by the Lazarus Group underscores the evolving threat landscape posed by sophisticated threat actors. Organizations must remain vigilant, implement necessary security measures, and stay informed about emerging threats to safeguard against such attacks.

References

Contact Us

If you have any questions or require further information on any other cybersecurity matters, please don’t hesitate to contact our dedicated team at [email protected].

If you want to see more about the SOC service we offer, please follow this link https://maidar.io

To ask a question, go to our support portal.

Share Articles

Insights

News Centre

Media Type
Why SOAR is important… How is it different… How it helps your org...
Many organisations today want to harness the power of automation to rid themselves of redundant and tedious tasks. Triaging alerts into incidents or initiating the overly complex process of blocking a known threat acto...
How a Security Operations Centre Enhances Your Security Awareness...
In today’s digital landscape, organisations face a constant barrage of cyber threats that can disrupt operations, compromise sensitive data, and damage reputations. To safeguard against these risks, businesses em...
Artificial Intelligence in The Security Operations Center (SOC): ...
In today’s rapidly evolving digital landscape, businesses face constant threats from cybercriminals seeking to exploit vulnerabilities in their systems. As organisations strive to protect their sensitive data and...
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability...
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, a...
Maidar Secure Advisory: SMM Driver Input Validation Vulnerability...
Lenovo released a security advisory (LEN-106014) for an SMM driver input validation vulnerability in the BIOS of some ThinkPad models. Identified as CVE-2022-48189, this vulnerability represents a substantial threat, a...
Maidar Secure Advisory: 0‑days exploit Vulnerability CVE‑2023‑419...
Google’s Threat Analysis Group (TAG), in partnership with The Citizen Lab, discovered an in-the-wild 0‑day exploit chain for iPhones. Developed by the commercial surveillance vendor, Intellexa, this exploit chain is us...
Hope is not a security strategy. Get proactive about your defence today with Maidar Secure.