CVE-2024-26218
NT Kernel -- elevation of privilege via improper kernel call handling
Summary
| Field | Value |
|---|---|
| Driver | ntoskrnl.exe |
| Vulnerability Class | Elevation of Privilege |
| Exploited ITW | No |
| CVSS | 7.8 |
Root Cause
ntoskrnl.exe fails to validate caller-supplied parameters in a system call path, letting unprivileged applications write to kernel memory.
PoC published by the exploits-forsale research team on GitHub.
Exploitation
The missing validation gives a write primitive into kernel memory. Overwrite the current process's token pointer with a SYSTEM token for privilege escalation.
Patch Analysis
The fix validates caller-supplied parameters in the affected system call path, blocking user-mode writes to kernel memory.