Vulnerability in Windows Driver Leads to System Crashes

Summary: A newly identified vulnerability, CVE-2024-6768, in the Windows CLFS.sys driver could allow unprivileged users to crash systems, resulting in a Blue Screen of Death (BSOD). This flaw poses significant risks for Windows 10 and 11 users due to its ease of exploitation and potential for denial of service attacks.

Threat Actor: Unprivileged users | unprivileged users
Victim: Windows operating systems | Windows operating systems

Key Point :

  • The vulnerability allows exploitation through a crafted log file format, leading to system crashes.
  • It is classified with a CVSS base score of 6.8, indicating medium severity and low attack complexity.
  • The exploit can be executed locally without user interaction, making it accessible to less skilled attackers.
  • Repeated exploitation can lead to system instability, data loss, and operational disruptions.
  • Organizations are advised to keep systems updated and monitor for unusual activities to mitigate risks.

A newly discovered vulnerability, identified as CVE-2024-6768, has surfaced in the Common Log File System (CLFS.sys) driver of Windows. 

This issue, identified by Fortra cybersecurity researcher, Ricardo Narvaja, highlights a flaw that could allow an unprivileged user to cause a system crash, resulting in Blue Screen of Death (BSOD). 

The vulnerability exists due to improper input data validation, leading to an unrecoverable system state.

The affected CLFS.sys driver is integral to Windows 10 and Windows 11 operating systems, meaning all versions of these operating systems are susceptible, regardless of updates. 

Overview of CVE-2024-6768 Vulnerability in Windows CLFS.sys Driver

The flaw allows a crafted value in a specific log file format, such as a .BLF file, to exploit the system and force it into a crash. The exploit is easy to execute with low privileges and does not require user interaction.

Narvaja said the vulnerability poses a significant risk as it can lead to system instability and denial of service (DoS) attacks. An attacker could exploit this flaw to repeatedly crash affected systems, potentially causing data loss and disruption to operations. 

The researcher reported the vulnerability and documented the process of reproducing the crash, including creating a Proof of Content (PoC) vector.

CVE-2024-6768 is classified with a CVSS base score of 6.8, indicating a medium severity level. The vulnerability is categorized under the Common Weakness Enumeration (CWE) as ‘Improper Validation of Specified Quantity in Input’ (CWE-1284).

The attack vector is local, meaning it must be executed on the system itself, and the attack complexity is low, making it accessible for less skilled attackers.

The exploit takes advantage of a specific offset within the CLFS client context structure. When executed, PoC exploits the vulnerability, manipulating the system into an unrecoverable state that triggers the KeBugCheckEx function call, a core Windows mechanism designed to handle critical errors.

This call results in the BSoD, which forces the system to restart. The vulnerability’s simplicity and the potential for repeated exploitation make it a crucial concern for organizations relying on Windows systems.

Read more on the BSoD: CrowdStrike Windows Outage: What We Can Learn

Narvaja encouraged researchers and professionals to keep systems updated and monitor for unusual activity to reduce the risk of exploitation.

Source: https://www.infosecurity-magazine.com/news/vulnerability-windows-driver

Views: 0