Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2024-38063
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Windows TCP/IP Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
Windows TCP/IP Remote Code Execution Vulnerability
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
整数下溢(超界折返)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows TCP/IP component 数字错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows tcp/ip是美国微软(Microsoft)公司的一个 Windows 的 Tcp/Ip 支持服务。 Microsoft Windows TCP/IP component存在数字错误漏洞。攻击者利用该漏洞可以远程执行代码。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 f
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
MicrosoftWindows 10 Version 1809 10.0.17763.0 ~ 10.0.17763.6293 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.6293 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.6293 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.2700 -
MicrosoftWindows 11 version 21H2 10.0.0 ~ 10.0.22000.3197 -
MicrosoftWindows 10 Version 21H2 10.0.19043.0 ~ 10.0.19044.4780 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.4037 -
MicrosoftWindows 10 Version 22H2 10.0.19045.0 ~ 10.0.19045.4780 -
MicrosoftWindows 11 version 22H3 10.0.22631.0 ~ 10.0.22631.4037 -
MicrosoftWindows 11 Version 23H2 10.0.22631.0 ~ 10.0.22631.4037 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.1085 -
MicrosoftWindows 10 Version 1507 10.0.10240.0 ~ 10.0.10240.20751 -
MicrosoftWindows 10 Version 1607 10.0.14393.0 ~ 10.0.14393.7259 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.7259 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.7259 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.22825 -
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.6003.0 ~ 6.0.6003.22825 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.22825 -
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.7601.0 ~ 6.1.7601.27277 -
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.1.7601.0 ~ 6.1.7601.27277 -
MicrosoftWindows Server 2012 6.2.9200.0 ~ 6.2.9200.25031 -
MicrosoftWindows Server 2012 (Server Core installation) 6.2.9200.0 ~ 6.2.9200.25031 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.22134 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.22134 -
MicrosoftWindows 11 Version 24H2 10.0.26100.0 ~ 10.0.26100.1457 -
II. Public POCs for CVE-2024-38063
#POC DescriptionSource LinkShenlong Link
1mitigation script by disabling ipv6 of all interfaceshttps://github.com/diegoalbuquerque/CVE-2024-38063POC Details
2CVE-2024-38063 exploits for salehttps://github.com/proxykingdev/CVE-2024-38063POC Details
3CVE-2024-38063 VBhttps://github.com/noradlb1/CVE-2024-38063-VBPOC Details
4CVE-2024-38063 PoC. CVE-2024-38063 Demohttps://github.com/hanks445/CVE-2024-38063POC Details
5Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.https://github.com/Sachinart/CVE-2024-38063-POCPOC Details
6Poc for cve-2024-38063 https://github.com/p33d/cve-2024-38063POC Details
7Nonehttps://github.com/dweger-scripts/CVE-2024-38063-RemediationPOC Details
8A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fixhttps://github.com/almogopp/Disable-IPv6-CVE-2024-38063-FixPOC Details
9CVE-2024-38063 research so you don't have to.https://github.com/Th3Tr1ckst3r/CVE-2024-38063POC Details
10Looks like this exploit is theoretical rather practicalhttps://github.com/haroonawanofficial/CVE-2024-38063-Research-ToolPOC Details
11poc for CVE-2024-38063 (RCE in tcpip.sys)https://github.com/ynwarcs/CVE-2024-38063POC Details
12Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.https://github.com/Sachinart/CVE-2024-38063-simulationPOC Details
13Nonehttps://github.com/patchpoint/CVE-2024-38063POC Details
14Windows TCP/IP IPv6(CVE-2024-38063)https://github.com/PumpkinBridge/Windows-CVE-2024-38063POC Details
15potential memory corruption vulnerabilities in IPv6 networks.https://github.com/zenzue/CVE-2024-38063-POCPOC Details
16Remotely Exploiting The Kernel Via IPv6https://github.com/AdminPentester/CVE-2024-38063-POC Details
17Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.https://github.com/Sachinart/CVE-2024-38063-pocPOC Details
18CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)https://github.com/ThemeHackers/CVE-2024-38063POC Details
19This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.https://github.com/KernelKraze/CVE-2024-38063_PoCPOC Details
20An educational IPv6 exploitation tool which demonstrates advanced networking techniques being used in the wild with CVE-2024-38063.https://github.com/Th3Tr1ckst3r/Denyv6POC Details
21Nonehttps://github.com/ps-interactive/cve-2024-38063POC Details
22Nonehttps://github.com/Brownpanda29/Cve-2024-38063POC Details
23quick powershell script to fix cve-2024-38063https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063POC Details
24CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6https://github.com/Faizan-Khanx/CVE-2024-38063POC Details
25Kode Eksploitasi CVE-2024-38063https://github.com/ArenaldyP/CVE-2024-38063-MediumPOC Details
26Nonehttps://github.com/lnx-dvlpr/cve-2024-38063POC Details
27Nonehttps://github.com/becrevex/CVE-2024-38063POC Details
28Nonehttps://github.com/idkwastaken/CVE-2024-38063POC Details
29Vulnerability CVE-2024-38063https://github.com/thanawee321/CVE-2024-38063POC Details
30Nonehttps://github.com/AliHj98/cve-2024-38063-AnonyvaderPOC Details
31PoC for Windows' IPv6 CVE-2024-38063https://github.com/Dragkob/CVE-2024-38063POC Details
32poc for exploiting cve-2024-38063https://github.com/selenagomez25/CVE-2024-38063POC Details
33Nonehttps://github.com/Laukage/Windows-CVE-2024-38063POC Details
34Nonehttps://github.com/jamesbishop785/CVE-2024-38063POC Details
35Nonehttps://github.com/brownpanda29/Cve-2024-38063POC Details
36A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attackshttps://github.com/jip-0-0-0-0-0/CVE-2024-38063-scannerPOC Details
37Nonehttps://github.com/fredagsguf/Windows-CVE-2024-38063POC Details
38AI-Powered CVE-2024-38063 0-Day Discovery Fuzzerhttps://github.com/haroonawanofficial/AI-CVE-2024-38063-0-DAYPOC Details
39Nonehttps://github.com/Skac44/CVE-2024-38063POC Details
40Monthly Land Temperature Surface Base Nano-Castle help learn the basics of Javahttps://github.com/akozsentre/CVE-2024-38063POC Details
41SSP H3https://github.com/thealice01/CVE-2024-38063POC Details
42Final Project in Fundamental network security,POC CVE-202438063https://github.com/Avidan1/CVE-2024-38063POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2024-38063
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2024-38063

No comments yet


Leave a comment