
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
Windows Installer Elevation of Privilege Vulnerability (CVE-2024-38014) is a critical security flaw discovered in Microsoft Windows MSI installers that allows attackers to escalate their privileges to SYSTEM rights. The vulnerability was discovered and reported by Michael Baer of the SEC Consult Vulnerability Lab, and was subsequently patched by Microsoft in September 2024 (Security Online).
The vulnerability exists in the repair functions of MSI installers, which can be executed by low-privileged users but operate with NT AUTHORITY\SYSTEM privileges. The exploit takes advantage of briefly opened command windows during the MSI repair process. The vulnerability has a CVSS v3.1 base score of 7.8 (HIGH) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The attack requires GUI access and specific conditions, particularly working through browsers like Firefox and Chrome (Security Online, NVD).
When successfully exploited, this vulnerability allows attackers to gain full SYSTEM-level privileges on the affected system, effectively giving them complete control over the machine. This level of access represents one of the highest privilege levels in Windows, enabling attackers to perform any administrative action on the compromised system (Security Online).
Microsoft has released a patch as part of its September 2024 updates that introduces a User Account Control (UAC) prompt when an MSI repair function is executed with elevated privileges. If the UAC prompt is denied, the repair process is aborted. Additionally, administrators are advised to consider disabling the repair functionality in vulnerable MSI installers until fully patched, and implement strong security practices. Software vendors are recommended to use secure coding practices when developing MSI installers, particularly avoiding visible windows during custom actions (Security Online).
SEC Consult has released an open-source analyzer tool called 'msiscan' to help administrators and security professionals identify potential vulnerabilities in MSI installers. The tool performs static analysis of MSI files to detect insecure configurations and potential privilege escalation pathways (Security Online).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”