Skip to main content
  1. Active Vulnerability List/
  2. 2024/

CVE-2024-38063 | Windows | RCE

VulnerabilityCVE-2024-38063
DescriptionCVE-2024-38063 is a critical remote code execution (RCE) vulnerability in the Windows TCP/IP stack, specifically targeting the IPv6 subsystem. This flaw allows remote attackers to execute arbitrary code on affected systems by sending specially crafted IPv6 packets, leading to potential full system compromise. The vulnerability stems from improper handling of these packets, resulting in a buffer overflow. (Picus Security)
Affected SystemsAll Windows systems that have IPv6 enabled.
Attack VectorRemote: An attacker can exploit this vulnerability by sending specially crafted IPv6 packets to a target system with IPv6 enabled, leading to remote code execution without requiring user interaction.
Exploitation Techniques- Crafting Malicious IPv6 Packets: Attackers create IPv6 packets designed to exploit the improper handling within the Windows TCP/IP stack.
- Triggering Buffer Overflow: The malicious packets cause a buffer overflow, allowing the attacker to execute arbitrary code on the target system. (Picus Security)
Proof of Concept (PoC)The PoC script demonstrates the exploitation process by sending crafted IPv6 packets to the target system:
- Packet Crafting: Utilizes the Scapy library to create IPv6 packets with specific headers and payloads designed to trigger the vulnerability.
- Network Interface Configuration: Allows specification of the network interface and target IPv6 address to direct the attack appropriately.
- Automated Packet Sending: Sends multiple batches of crafted packets to increase the likelihood of successful exploitation. (GitHub - ynwarcs/CVE-2024-38063)
The Impact of the Bug- Unauthorized execution of arbitrary code on the victim’s machine.
- Potential full system compromise, leading to data theft, system damage, or further network intrusion.
- Elevated risk due to the widespread use of Windows operating systems in various environments.
How to Detect Infections- Deep Packet Inspection (DPI): Utilize DPI to detect anomalies in IPv6 packets, such as malformed headers or unusual payload sizes that align with the attack characteristics.
- Memory Dump Analysis: Inspect kernel memory dumps for signs of buffer overflow activity, such as overwritten return addresses or unusual stack traces.
- Event Log Correlation: Review Windows Event Logs for unusual network activity, especially in logs related to the TCP/IP stack or IPv6 processing errors.
- Signature-Based Detection: Deploy intrusion detection systems (IDS) with signatures crafted to identify the specific patterns of the malicious IPv6 packets used in exploitation.
Mitigation Steps- Apply Patches: Update Windows systems with the latest security patches provided by Microsoft to address this vulnerability.
- Disable IPv6: If IPv6 is not required, consider disabling it to reduce the attack surface.
- Network Security Measures: Implement network-level protections, such as firewalls, to filter and block malicious IPv6 traffic.
References- Picus Security - CVE-2024-38063: Remote Kernel Exploitation via IPv6 in Windows
- GitHub - ynwarcs/CVE-2024-38063
- Microsoft Security Response Center - CVE-2024-38063
- NVD - CVE-2024-38063