Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2024-23594 CVE-2024-23593 |
CWE-ID | CWE-121 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software |
Windows Operating systems & Components / Operating system Windows Server Operating systems & Components / Operating system |
Vendor | Microsoft |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU88431
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-23594
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise the target system.
The vulnerability exists due to a boundary error in LenovoBT.efi within System Recovery Bootloader. A remote administrator on the local network can trigger stack-based buffer overflow and bypass Secure Boot.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: 10 S - 11
Windows Server: 2019 10.0.17763.1 - 2022 23H2
CPE2.3https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-23594
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU88432
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-23593
CWE-ID:
CWE-121 - Stack-based buffer overflow
Exploit availability: No
DescriptionThe vulnerability allows a local user can gain elevated privileges.
The vulnerability exists due to a boundary error in System Recovery Bootloader. A local user can modify the boot manager and escalate privileges.
MitigationInstall updates from vendor's website.
Vulnerable software versionsWindows: 10 S - 11
Windows Server: 2019 10.0.17763.1 - 2022 23H2
CPE2.3https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2024-23593
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.