Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now

Teilen:

Microsoft warned customers this Tuesday to patch a critical TCP/IP remote code execution (RCE) vulnerability with an increased likelihood of exploitation that impacts all Windows systems using IPv6, which is enabled by default.

Found by Kunlun Lab’s XiaoWei and tracked as CVE-2024-38063, this security bug is caused by an Integer Underflow weakness, which attackers could exploit to trigger buffer overflows that can be used to execute arbitrary code on vulnerable Windows 10, Windows 11, and Windows Server systems.

“Considering its harm, I will not disclose more details in the short term,” the security researcher tweeted, adding that blocking IPv6 on the local Windows firewall won’t block exploits because the vulnerability is triggered prior to it being processed by the firewall.

As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly sending IPv6 packets that include specially crafted packets.

Microsoft also shared its exploitability assessment for this critical vulnerability, tagging it with an “exploitation more likely” label, which means that threat actors could create exploit code to “consistently exploit the flaw in attacks.”

“Moreover, Microsoft is aware of past instances of this type of vulnerability being exploited. This would make it an attractive target for attackers, and therefore more likely that exploits could be created,” Redmond explains.

“As such, customers who have reviewed the security update and determined its applicability within their environment should treat this with a higher priority.”

As a mitigation measure for those who can’t immediately install this week’s Windows security updates, Microsoft recommends disabling IPv6 to remove the attack surface.

However, on its support website, the company says the IPv6 network protocol stack is a “mandatory part of Windows Vista and Windows Server 2008 and newer versions” and doesn’t recommend toggling off IPv6 or its components because this might cause some Windows components to stop working.

Wormable vulnerability

Head of Threat Awareness at Trend Micro’s Zero Day Initiative Dustin Childs also labeled the CVE-2024-38063 bug as one of the most severe vulnerabilities fixed by Microsoft this Patch Tuesday, tagging it as a wormable flaw.

“The worst is likely the bug in TCP/IP that would allow a remote, unauthenticated attacker to get elevated code execution just by sending specially crafted IPv6 packets to an affected target,” Childs said.

“That means it’s wormable. You can disable IPv6 to prevent this exploit, but IPv6 is enabled by default on just about everything.”

While Microsoft and other companies warned Windows users to patch their systems as soon as possible to block potential attacks using CVE-2024-38063 exploits, this isn’t the first and likely won’t be the last Windows vulnerability exploitable using IPv6 packets.

Over the last four years, Microsoft has patched multiple other IPv6 issues, including two TCP/IP flaws tracked as CVE-2020-16898/9 (also called Ping of Death), that can be exploited in remote code execution (RCE) and denial of service (DoS) attacks using malicious ICMPv6 Router Advertisement packets.

Additionally, an IPv6 fragmentation bug (CVE-2021-24086) left all Windows versions vulnerable to DoS attacks, and a DHCPv6 flaw (CVE-2023-28231) made it possible to gain RCE with a specially crafted call.

Even though attackers are yet to exploit them in widespread attacks targeting all IPv6-enabled Windows devices, users are still advised to apply this month’s Windows security updates immediately due to CVE-2024-38063’s increased likelihood of exploitation.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
9:56 am, Mai 9, 2025
Wetter-Symbol 12°C
L: 11° | H: 13°
wenige Wolken
Luftfeuchtigkeit: 75 %
Druck: 1021 mb
Wind: 6 mph E
Windböe: 10 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 20%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:17 am
Sonnenuntergang: 8:35 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
11° | 13°°C 0 mm 0% 12 mph 75 % 1022 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
9° | 20°°C 0 mm 0% 12 mph 86 % 1021 mb 0 mm/h
So. Mai 11 10:00 pm
Wetter-Symbol
11° | 23°°C 0.94 mm 94% 12 mph 86 % 1015 mb 0 mm/h
Mo. Mai 12 10:00 pm
Wetter-Symbol
12° | 21°°C 0.97 mm 97% 11 mph 95 % 1016 mb 0 mm/h
Di. Mai 13 10:00 pm
Wetter-Symbol
13° | 21°°C 0.46 mm 46% 11 mph 77 % 1022 mb 0 mm/h
Today 10:00 am
Wetter-Symbol
12° | 13°°C 0 mm 0% 8 mph 75 % 1021 mb 0 mm/h
Today 1:00 pm
Wetter-Symbol
13° | 16°°C 0 mm 0% 12 mph 63 % 1021 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
15° | 17°°C 0 mm 0% 11 mph 47 % 1020 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
15° | 15°°C 0 mm 0% 9 mph 40 % 1020 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
12° | 12°°C 0 mm 0% 8 mph 63 % 1022 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 6 mph 74 % 1021 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
9° | 9°°C 0 mm 0% 4 mph 86 % 1020 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 79 % 1020 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,692.68
3.34%
Ethereum(ETH)
€2,148.43
24.54%
Fesseln(USDT)
€0.89
0.00%
XRP(XRP)
€2.11
7.27%
Solana(SOL)
€148.39
8.98%
USDC(USDC)
€0.89
0.00%
Dogecoin(DOGE)
€0.183043
12.51%
Shiba Inu(SHIB)
€0.000013
11.51%
Pepe(PEPE)
€0.000012
44.08%
Peanut das Eichhörnchen(PNUT)
€0.243049
60.99%
Nach oben scrollen