Share This:

Cybersecurity Threat Advisory

The hacker group Lazarus recently exploited a patched, zero-day flaw in Microsoft Windows. The vulnerability, tracked as CVE-2024-38193 with a CVSS score of 7.8, is a Bring Your Own Vulnerable Driver (BYOVD) vulnerability for Winsock. Continue reading this Cybersecurity Threat Advisory to mitigate your risk and protect your system.

What is the threat?

CVE-2024-38193 is a privilege escalation vulnerability in the AFD.sys driver, which comes pre-installed on all Windows devices. This vulnerability allows attackers to bypass normal security restrictions and gain unauthorized access to sensitive system areas. It also enables users to access system areas that are typically restricted.

Why is it noteworthy?

The attack is particularly dangerous because the AFD.sys driver is a core component of Windows. Its exploitation does not require the introduction of additional drivers. This method of attack goes beyond the typical BYOVD approach, where attackers bring their own vulnerable drivers to bypass security measures.

The flaw is reminiscent of a previous privilege escalation vulnerability, CVE-2024-21338, which involved the AppLocker driver and allowed similar unauthorized access. The Lazarus Group has demonstrated a pattern of exploiting such privilege escalation flaws, including using the FudModule rootkit to evade detection.

What is the exposure or risk?

The Lazarus Group strategically deploys the FudModule rootkit under specific circumstances to maximize its impact, showcasing their selective and calculated approach. This careful deployment strategy, combined with the broad reach of the affected driver, makes CVE-2024-38193 a critical vulnerability.

What are the recommendations?

Barracuda MSP recommends the following actions to mitigate any risk caused by CVE-2024-38193:

  • Install the latest update patch as soon as possible and verify that automatic updates are functioning correctly to ensure timely application of critical security fixes.
  • Conduct thorough background checks on potential hires and use identity verification services to prevent infiltration by threat actors using social engineering tactics.
  • Audit and review security configurations to ensure that access controls and permissions are set and updated correctly.

References

For more in-depth information on the above recommendations, please visit the following links:

If you have any questions about this Cybersecurity Threat Advisory, please contact Barracuda XDR’s Security Operations Center.


Share This:
Zachary Beaudet

Posted by Zachary Beaudet

Zachary is a Cybersecurity Analyst at Barracuda MSP. He's a security expert, working on our Blue Team within our Security Operations Center. Zachary supports our XDR service delivery and is highly skilled at analyzing security events to detect cyber threats, helping keep our partners and their customers protected.

Leave a reply

Your email address will not be published. Required fields are marked *