Rapid7 Vulnerability & Exploit Database

Microsoft Windows: CVE-2024-26173: Windows Kernel Elevation of Privilege Vulnerability

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Microsoft Windows: CVE-2024-26173: Windows Kernel Elevation of Privilege Vulnerability

Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
03/12/2024
Created
03/13/2024
Added
03/12/2024
Modified
04/30/2024

Description

Microsoft Windows: CVE-2024-26173: Windows Kernel Elevation of Privilege Vulnerability

Solution(s)

  • microsoft-windows-windows_11-21h2-kb5035854
  • microsoft-windows-windows_11-22h2-kb5035853
  • microsoft-windows-windows_11-23h2-kb5035853
  • msft-kb5035845-28d5f70c-c745-4ee9-8f98-c8ae448b7f2b
  • msft-kb5035845-7e8a4d88-e593-4cc1-ae6c-06c5c52ef989
  • msft-kb5035845-c8d7796f-3cb9-4678-b1e4-fe460a898b98
  • msft-kb5035845-d6178fd7-2976-42d3-a7ad-fdb17ea2cbb2
  • msft-kb5035849-68587b9c-90f0-4fd5-ab27-d159ed273beb
  • msft-kb5035849-69c36f19-90e0-49fb-b0f2-f317be093b59
  • msft-kb5035849-dffddef9-def1-42e9-804d-f1007a46dc32
  • msft-kb5035855-0da3d9cc-c698-4135-823d-8acd26dff3b4
  • msft-kb5035855-7c253f60-337d-4d47-915e-559103e4775c
  • msft-kb5035855-a8652c3e-561c-4dbe-be57-454c4abb46ce
  • msft-kb5035856-79727266-4527-4757-bfd8-4d0fcd399bcf
  • msft-kb5035857-748c24d5-2f5a-4d54-a19c-3c21dbfcb49f
  • msft-kb5035857-a7dad4d4-48b1-41e2-89e7-004e046c053b
  • msft-kb5035858-4aa0417e-032b-4754-837e-a38577adec1d
  • msft-kb5035858-9fea5693-ee29-4891-a474-b09cc450c0d3
  • msft-kb5035885-66091aff-518f-4b15-824e-f2d500423b4c
  • msft-kb5035888-78d250c5-4777-4953-b36a-f8ebeffb6678
  • msft-kb5035919-c1dacfec-e6e8-4c76-8c15-14fa0a371340
  • msft-kb5035920-1c385d43-100d-41d2-be67-0957979cc3c3
  • msft-kb5035920-d9d460fb-2770-4e30-bef1-ef4062030a5f
  • msft-kb5035930-56db070c-2e0c-4c3a-a638-6d840b4445e5
  • msft-kb5035933-bb173464-b365-4396-a82d-18c6470ea72f
  • msft-kb5035933-ff333c16-6e30-41f8-b970-a5d69f9a81ff

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;