支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%
获取后续新漏洞提醒登录后订阅
一、 漏洞 CVE-2024-49138 基础信息
漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
Windows Common Log File System Driver Elevation of Privilege Vulnerability
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Windows Common Log File System Driver Elevation of Privilege Vulnerability
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
堆缓冲区溢出
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Microsoft Windows Common Log File System Driver 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Microsoft Windows Common Log File System Driver是美国微软(Microsoft)公司的通用日志文件系统 (CLFS) API 提供了一个高性能、通用的日志文件子系统,专用客户端应用程序可以使用该子系统并且多个客户端可以共享以优化日志访问。 Microsoft Windows Common Log File System Driver存在安全漏洞。攻击者利用该漏洞可以提升权限。以下产品和版本受到影响:Windows Server 2008 R2 for x64-
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD
受影响产品
厂商产品影响版本CPE订阅
MicrosoftWindows 10 Version 1809 10.0.17763.0 ~ 10.0.17763.6659 -
MicrosoftWindows Server 2019 10.0.17763.0 ~ 10.0.17763.6659 -
MicrosoftWindows Server 2019 (Server Core installation) 10.0.17763.0 ~ 10.0.17763.6659 -
MicrosoftWindows Server 2022 10.0.20348.0 ~ 10.0.20348.2966 -
MicrosoftWindows 10 Version 21H2 10.0.19043.0 ~ 10.0.19044.5247 -
MicrosoftWindows 11 version 22H2 10.0.22621.0 ~ 10.0.22621.4602 -
MicrosoftWindows 10 Version 22H2 10.0.19045.0 ~ 10.0.19045.5247 -
MicrosoftWindows Server 2025 (Server Core installation) 10.0.26100.0 ~ 10.0.26100.2605 -
MicrosoftWindows 11 version 22H3 10.0.22631.0 ~ 10.0.22631.4602 -
MicrosoftWindows 11 Version 23H2 10.0.22631.0 ~ 10.0.22631.4602 -
MicrosoftWindows Server 2022, 23H2 Edition (Server Core installation) 10.0.25398.0 ~ 10.0.25398.1308 -
MicrosoftWindows 11 Version 24H2 10.0.26100.0 ~ 10.0.26100.2605 -
MicrosoftWindows Server 2025 10.0.26100.0 ~ 10.0.26100.2605 -
MicrosoftWindows 10 Version 1507 10.0.10240.0 ~ 10.0.10240.20857 -
MicrosoftWindows 10 Version 1607 10.0.14393.0 ~ 10.0.14393.7606 -
MicrosoftWindows Server 2016 10.0.14393.0 ~ 10.0.14393.7606 -
MicrosoftWindows Server 2016 (Server Core installation) 10.0.14393.0 ~ 10.0.14393.7606 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.23016 -
MicrosoftWindows Server 2008 Service Pack 2 (Server Core installation) 6.0.6003.0 ~ 6.0.6003.23016 -
MicrosoftWindows Server 2008 Service Pack 2 6.0.6003.0 ~ 6.0.6003.23016 -
MicrosoftWindows Server 2008 R2 Service Pack 1 6.1.7601.0 ~ 6.1.7601.27467 -
MicrosoftWindows Server 2008 R2 Service Pack 1 (Server Core installation) 6.1.7601.0 ~ 6.1.7601.27467 -
MicrosoftWindows Server 2012 6.2.9200.0 ~ 6.2.9200.25222 -
MicrosoftWindows Server 2012 (Server Core installation) 6.2.9200.0 ~ 6.2.9200.25222 -
MicrosoftWindows Server 2012 R2 6.3.9600.0 ~ 6.3.9600.22318 -
MicrosoftWindows Server 2012 R2 (Server Core installation) 6.3.9600.0 ~ 6.3.9600.22318 -
二、漏洞 CVE-2024-49138 的公开POC
#POC 描述源链接神龙链接
1POC exploit for CVE-2024-49138https://github.com/MrAle98/CVE-2024-49138-POCPOC详情
2POC exploit for CVE-2024-49138https://github.com/aspire20x/CVE-2024-49138-POCPOC详情
3Nonehttps://github.com/bananoname/CVE-2024-49138-POCPOC详情
4Nonehttps://github.com/DeividasTerechovas/SOC335-CVE-2024-49138-Exploitation-DetectedPOC详情
5Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT.https://github.com/CyprianAtsyor/letsdefend-cve-2024-49138-investigationPOC详情
6Nonehttps://github.com/Glitch-ao/SOC335-CVE-2024-49138-Exploitation-DetectedPOC详情
7This is my biggest project yet: a DLang file encryptor that escalates privileges using CVE-2024-49138 and disables Windows Defender.https://github.com/1rhino2/DLang-file-encryptorPOC详情
8In this lab I walked through an end-to-end intrusion that began with an external RDP break-in, used a brand-new CLFS privilege-escalation exploit (CVE-2024–49138), and ended with SYSTEM-level cloud credential harvesting. Below is the story, the evidence, and the lessons I drew from it.https://github.com/onixgod/SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-WriteupPOC详情
9This is my biggest project yet: a DLang file encryptor that escalates privileges using CVE-2024-49138 and disables Windows Defender.https://github.com/1rhino2/SCRAPPEDPOC详情
10Nonehttps://github.com/codetronik/CVE-2024-49138POC详情
11Nonehttps://github.com/Bridg3Ops/SOC335-CVE-2024-49138-Exploitation-DetectedPOC详情
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC
三、漏洞 CVE-2024-49138 的情报信息
Please 登录 to view more intelligence information
四、漏洞 CVE-2024-49138 的评论

暂无评论


发表评论