CVE-2024-26182Use After Free in Microsoft Windows 10 Version 1607

CWE-416Use After Free17 documents10 sources
Severity
7.8HIGHNVD
EPSS
2.2%
top 15.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 12
Latest updateMay 1

Description

Windows Kernel Elevation of Privilege Vulnerability

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages24 packages

NVDmicrosoft/windows< 10.0.14393.6796+1
NVDmicrosoft/windows_10_1607< 10.0.14393.6796
NVDmicrosoft/windows_10_1809< 10.0.17763.5576
NVDmicrosoft/windows_10_21h2< 10.0.19044.4170
NVDmicrosoft/windows_10_22h2< 10.0.19045.4170

🔴Vulnerability Details

4
Project0
The Windows Registry Adventure #7: Attack surface analysis - Project Zero2025-05-01
Project0
The Windows Registry Adventure #5: The regf file format - Project Zero2024-12-01
Project0
The Windows Registry Adventure #1: Introduction and research results - Project Zero2024-04-01
GHSA
GHSA-75q6-q84v-3c56: Windows Kernel Elevation of Privilege Vulnerability2024-03-12

📋Vendor Advisories

1
Microsoft
Windows Kernel Elevation of Privilege Vulnerability2024-03-12

🕵️Threat Intelligence

11
Krebs
Patch Tuesday, March 2024 Edition2024-03-12
Bleepingcomputer
Microsoft March 2024 Patch Tuesday fixes 60 flaws, 18 RCE bugs2024-03-12
Qualys
Microsoft and Adobe Patch Tuesday, March 2024 Security Update Review2024-03-12
Tenable
Microsoft’s March 2024 Patch Tuesday Addresses 59 CVEs (CVE-2024-21407)2024-03-12
Trendmicro
The March 2024 Security Update Review2024-03-12
CVE-2024-26182 — Use After Free in Microsoft | cvebase