
Cloud Vulnerability DB
A community-led vulnerabilities database
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability (CVE-2024-38185) is a security flaw discovered by Cisco Talos' Vulnerability Research team in August 2024. The vulnerability affects Microsoft CLIPSP.SYS driver versions 10.0.22621 Build 22621, 10.0.26080.1, and 10.0.26085.1, which is used to implement Client License System Policy on Windows 10 and 11. This vulnerability has a CVSS v3.1 base score of 7.8 (HIGH) (Microsoft Advisory, Talos Report).
The vulnerability exists in the License update functionality of Microsoft CLIPSP.SYS and involves multiple out-of-bounds read vulnerabilities. The issue occurs when handling license data of type 0x1, where a specially crafted license blob can lead to information disclosure. The vulnerability can be triggered through the NtQuerySystemInformation function call. The CVSS vector is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, indicating local access requirements with low attack complexity (Talos Report).
The vulnerability could allow an attacker to gain SYSTEM-level privileges through elevation of privilege. The out-of-bounds read vulnerability could lead to information disclosure, potentially exposing sensitive system information to unauthorized users (Talos Report).
Microsoft has released security updates to address this vulnerability. Affected users should apply the latest security patches provided by Microsoft to protect their systems (Microsoft Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."