APT Group Gamaredon aka Shuckworm – Active IOCs
September 11, 2024ICS: Rockwell Automation FactoryTalk View SE Vulnerability
September 11, 2024APT Group Gamaredon aka Shuckworm – Active IOCs
September 11, 2024ICS: Rockwell Automation FactoryTalk View SE Vulnerability
September 11, 2024Severity
High
Analysis Summary
CVE-2024-38217 CVSS:5.4
Microsoft Windows could allow a remote attacker to bypass security restrictions. An attacker could exploit this vulnerability to bypass security feature to cause impact on integrity and availability.
CVE-2024-38014 CVSS:7.8
Microsoft Windows could allow a local authenticated attacker to gain elevated privileges on the system, caused by a flaw in the Installer component. By executing a specially crafted program, an authenticated attacker could exploit this vulnerability to execute arbitrary code with higher privileges.
CVE-2024-43491 CVSS:9.8
Microsoft Windows could allow a remote attacker to execute arbitrary code on the system, caused by a flaw in the Update component. By sending a specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
Impact
- Code Execution
- Security Bypass
- Privilege Escalation
Indicators of Compromise
CVE
- CVE-2024-38217
- CVE-2024-38014
- CVE-2024-43491
Affected Vendors
Affected Products
- Microsoft Windows 10 for 32-bit Systems
- Microsoft Windows 10 for x64-based Systems
- Microsoft Windows 10 Version 1507 - 10.0.0
- Microsoft Windows 10 Version 1809 - 10.0.0
- Microsoft Windows 10 Version 21H2 - 10.0.0
- Microsoft Windows 10 Version 22H2 - 10.0.0
- Microsoft Windows 11 version 21H2 - 10.0.0
- Microsoft Windows 11 version 22H2 - 10.0.0
- Microsoft Windows Server 2019 - 10.0.0
- Microsoft Windows Server 2019 (Server Core installation) - 10.0.0
- Microsoft Windows Server 2022 - 10.0.0
Remediation
Use Microsoft Automatic Update to apply the appropriate patch for your system, or the Microsoft Security Update Guide to search for available patches.