Skip to content

CVE-2024-26218

NT Kernel -- elevation of privilege via improper kernel call handling

Summary

Field Value
Driver ntoskrnl.exe
Vulnerability Class Elevation of Privilege
Exploited ITW No
CVSS 7.8

Root Cause

ntoskrnl.exe fails to validate caller-supplied parameters in a system call path, letting unprivileged applications write to kernel memory.

PoC published by the exploits-forsale research team on GitHub.

Exploitation

The missing validation gives a write primitive into kernel memory. Overwrite the current process's token pointer with a SYSTEM token for privilege escalation.

Patch Analysis

The fix validates caller-supplied parameters in the affected system call path, blocking user-mode writes to kernel memory.

References