CVE-2024-30088

HIGH
2024-06-11 [email protected]
7.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:20 vuln.today
Added to CISA KEV
Oct 28, 2025 - 14:23 cisa
CISA KEV
Patch Released
Oct 28, 2025 - 14:23 nvd
Patch available
CVE Published
Jun 11, 2024 - 17:15 nvd
HIGH 7.0

Description

Windows Kernel Elevation of Privilege Vulnerability

Analysis

Windows Kernel contains a TOCTOU race condition vulnerability allowing local privilege escalation, exploited by the OilRig (APT34/Iranian) group for government network compromise.

Technical Context

The CWE-367 TOCTOU vulnerability in the kernel allows a local attacker to win a race condition between security check and resource use, escalating from standard user to SYSTEM privileges.

Affected Products

['Microsoft Windows (Kernel component)']

Remediation

Apply Microsoft security update. Deploy Windows Defender Credential Guard. Monitor for kernel exploitation indicators. Implement network segmentation to limit lateral movement.

Priority Score

179
Low Medium High Critical
KEV: +50
EPSS: +84.1
CVSS: +35
POC: 0

Share

CVE-2024-30088 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy