一、 漏洞 CVE-2024-38063 基础信息
漏洞信息
                                        # Windows TCP/IP 远程代码执行漏洞

# Windows TCP/IP Remote Code Execution Vulnerability

## 概述
此漏洞存在于Windows操作系统的TCP/IP协议栈中。攻击者可以通过发送特制的网络数据包,远程实现代码执行,从而完全控制受影响的系统。

## 影响版本
- Windows 10
- Windows Server 2019
- Windows Server 2022
- 其他基于Windows的系统可能受到影响

## 细节
攻击者在未授权的情况下,向目标系统发送特制的数据包,可以触发TCP/IP协议栈中的堆溢出错误,从而导致远程代码执行。这种漏洞利用无需用户的交互操作,攻击可以在后台静默执行。

## 影响
成功利用此漏洞,攻击者可获得与本地用户相同的权限。这意味着攻击者能执行以下操作:
- 安装程序
- 查看、更改或删除数据
- 创建拥有完全用户权限的新账户

建议用户尽快安装微软官方发布的安全更新以修补此漏洞。
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
Windows TCP/IP Remote Code Execution Vulnerability
来源:美国国家漏洞数据库 NVD
漏洞描述信息
Windows TCP/IP Remote Code Execution Vulnerability
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
来源:美国国家漏洞数据库 NVD
漏洞类别
整数下溢(超界折返)
来源:美国国家漏洞数据库 NVD
漏洞标题
Microsoft Windows TCP/IP component 数字错误漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Microsoft Windows tcp/ip是美国微软(Microsoft)公司的一个 Windows 的 Tcp/Ip 支持服务。 Microsoft Windows TCP/IP component存在数字错误漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 f
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
数字错误
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2024-38063 的公开POC
# POC 描述 源链接 神龙链接
1 mitigation script by disabling ipv6 of all interfaces https://github.com/diegoalbuquerque/CVE-2024-38063 POC详情
2 CVE-2024-38063 exploits for sale https://github.com/proxykingdev/CVE-2024-38063 POC详情
3 CVE-2024-38063 VB https://github.com/noradlb1/CVE-2024-38063-VB POC详情
4 CVE-2024-38063 PoC. CVE-2024-38063 Demo https://github.com/hanks445/CVE-2024-38063 POC详情
5 Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability. https://github.com/Sachinart/CVE-2024-38063-POC POC详情
6 Poc for cve-2024-38063 https://github.com/p33d/cve-2024-38063 POC详情
7 None https://github.com/dweger-scripts/CVE-2024-38063-Remediation POC详情
8 A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix POC详情
9 CVE-2024-38063 research so you don't have to. https://github.com/Th3Tr1ckst3r/CVE-2024-38063 POC详情
10 Looks like this exploit is theoretical rather practical https://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool POC详情
11 poc for CVE-2024-38063 (RCE in tcpip.sys) https://github.com/ynwarcs/CVE-2024-38063 POC详情
12 Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability. https://github.com/Sachinart/CVE-2024-38063-simulation POC详情
13 None https://github.com/patchpoint/CVE-2024-38063 POC详情
14 Windows TCP/IP IPv6(CVE-2024-38063) https://github.com/PumpkinBridge/Windows-CVE-2024-38063 POC详情
15 potential memory corruption vulnerabilities in IPv6 networks. https://github.com/zenzue/CVE-2024-38063-POC POC详情
16 Remotely Exploiting The Kernel Via IPv6 https://github.com/AdminPentester/CVE-2024-38063- POC详情
17 Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability. https://github.com/Sachinart/CVE-2024-38063-poc POC详情
18 CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE) https://github.com/ThemeHackers/CVE-2024-38063 POC详情
19 This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability. https://github.com/KernelKraze/CVE-2024-38063_PoC POC详情
20 An educational IPv6 exploitation tool which demonstrates advanced networking techniques being used in the wild with CVE-2024-38063. https://github.com/Th3Tr1ckst3r/Denyv6 POC详情
21 None https://github.com/ps-interactive/cve-2024-38063 POC详情
22 None https://github.com/Brownpanda29/Cve-2024-38063 POC详情
23 quick powershell script to fix cve-2024-38063 https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063 POC详情
24 CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6 https://github.com/Faizan-Khanx/CVE-2024-38063 POC详情
25 Kode Eksploitasi CVE-2024-38063 https://github.com/ArenaldyP/CVE-2024-38063-Medium POC详情
26 None https://github.com/lnx-dvlpr/cve-2024-38063 POC详情
27 None https://github.com/becrevex/CVE-2024-38063 POC详情
28 None https://github.com/idkwastaken/CVE-2024-38063 POC详情
29 Vulnerability CVE-2024-38063 https://github.com/thanawee321/CVE-2024-38063 POC详情
30 None https://github.com/AliHj98/cve-2024-38063-Anonyvader POC详情
31 PoC for Windows' IPv6 CVE-2024-38063 https://github.com/Dragkob/CVE-2024-38063 POC详情
32 poc for exploiting cve-2024-38063 https://github.com/selenagomez25/CVE-2024-38063 POC详情
33 None https://github.com/Laukage/Windows-CVE-2024-38063 POC详情
34 None https://github.com/jamesbishop785/CVE-2024-38063 POC详情
35 None https://github.com/brownpanda29/Cve-2024-38063 POC详情
36 A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attacks https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner POC详情
37 None https://github.com/fredagsguf/Windows-CVE-2024-38063 POC详情
三、漏洞 CVE-2024-38063 的情报信息