Skip to content

Commit 535efab

Browse files
committed
fix
1 parent 4054666 commit 535efab

File tree

2 files changed

+1
-1
lines changed

2 files changed

+1
-1
lines changed

content/1day-breakdowns/cve-2024-38041.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,6 @@ showTableOfContents: true
1515

1616
CVE-2024-38041 is a information leak vulnerability in the Windows AppID driver (`appid.sys`). The flaw lies in the handler for IOCTL code `0x22A014`, which lacks proper validation of the caller's access mode. Specifically, the `AipDeviceIoControlDispatch` function does not verify that the request originates from kernel mode. As a result, a user-mode process running as LOCAL SERVICE can trigger this IOCTL to leak kernel pointers via a shared SystemBuffer. By impersonating the LOCAL SERVICE account and invoking the vulnerable IOCTL, an attacker can leak kernel addresses, bypassing KASLR and paving the way for further kernel exploitation.
1717

18-
**Title:** Windows Kernel Information Disclosure Vulnerability
1918
**CVE-2024-38041:** https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38041
2019
**Vulnerability Type:** Exposure of Sensitive Information to an Unauthorized Actor
2120
**Tested On:** Windows 11 23H2

content/1day-breakdowns/cve-2025-21333.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ showTableOfContents: true
1515

1616
A vulnerability in the Windows Hyper-V NT Kernel Integration VSP driver exists due to a vulnerable function, `VkiRootAdjustSecurityDescriptorForVmwp()`, which can be invoked from user mode. This leads to a heap-based buffer overflow, ultimately resulting in privilege escalation.
1717

18+
1819
**CVE-2025-21333:** https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21333
1920
**Vulnerability Type:** Heap-based Buffer Overflow
2021
**Tested On:** Windows 11 23H2

0 commit comments

Comments
 (0)