Windows Users Urged to Patch Critical Security Flaw (CVE-2024-43629)
Microsoft has released updates for several Windows products, addressing the CVE-2024-43629 vulnerability identified by a Positive Technologies security expert. The updates encompass Windows 10, Windows 11, and server versions—Windows Server 2025, Windows Server 2022, and Windows Server 2019. This vulnerability received a CVSS 3.1 score of 7.8, indicating a high level of risk.
According to the Positive Technologies expert, this Local Privilege Escalation (LPE) vulnerability allows an attacker with access to a victim’s device to elevate privileges, potentially leading to system takeover and further attack development. The vulnerability was detected during a routine analysis of popular applications, and details were responsibly disclosed to Microsoft, who swiftly issued a patch. Users are strongly advised to install these updates promptly.
Exploiting this vulnerability could enable attackers to elevate user privileges to system level. Based on PT Expert Security Center’s experience, this technique is often employed to access critical system components, a necessary step for advancing an attack.
In 2017, PT Expert Security Center similarly identified and helped Microsoft address a comparable vulnerability (CVE-2017-0263) in Windows 10 and earlier versions. Back then, this vulnerability was exploited in phishing campaigns monitored during cyber threat assessments, allowing attackers to gain maximum privileges on Windows 10, 8.1, 7, Server 2008, Server 2012, and Server 2016 environments. Exploitation required prior access to the system.