CVE-2024-38193 vulnerability in Microsoft Products
Published on August 13, 2024


Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Known Exploited Vulnerability
This Microsoft Windows Ancillary Function Driver for WinSock Privilege Escalation Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Microsoft Windows Ancillary Function Driver for WinSock contains an unspecified vulnerability that allows for privilege escalation, enabling a local attacker to gain SYSTEM privileges.
The following remediation steps are recommended / required by September 3, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Vulnerability Analysis
Products Associated with CVE-2024-38193
You can be notified by stack.watch whenever vulnerabilities like CVE-2024-38193 are published in these products:
What versions are vulnerable to CVE-2024-38193?
-
Microsoft Windows Server 2008 Version r2 sp1 x64
-
Microsoft Windows Server 2012 Version r2
-
Microsoft Windows Server 2008 Version - sp2
-
Microsoft Windows 10 1809 Fixed in Version 10.0.17763.6189
-
Microsoft Windows Server 2019 Fixed in Version 10.0.17763.6189
-
Microsoft Windows Server 2022 Fixed in Version 10.0.20348.2655
-
Microsoft Windows 11 21h2 Fixed in Version 10.0.22000.3147
-
Microsoft Windows 10 21h2 Fixed in Version 10.0.19044.4780
-
Microsoft Windows 11 22h2 Fixed in Version 10.0.22621.4037
-
Microsoft Windows 10 22h2 Fixed in Version 10.0.19045.4780
-
Microsoft Windows 11 23h2 Fixed in Version 10.0.22631.4037
-
Microsoft Windows Server 2022 23h2 Fixed in Version 10.0.25398.1085
-
Microsoft Windows 10 1507 Fixed in Version 10.0.10240.20751
-
Microsoft Windows Server 2016 Fixed in Version 10.0.14393.7259
-
Microsoft Windows Server 2012 Fixed in Version 6.2.9200.25031
-
Microsoft Windows 11 24h2 Fixed in Version 10.0.26100.1457
-
Microsoft Windows 10 1607 Fixed in Version 10.0.14393.7259