New Vulnerability in Windows Wi-Fi Driver Poses Security Risk

Apps & Games / Wi-Fi Drivers for Intel Wireless Adapters / Desktop / Windows / News Wi-Fi Drivers for Intel Wireless Adapters for Desktop Windows / New Vulnerability in Windows Wi-Fi Driver Poses Security Risk
25 Jun 2024

Understanding CVE-2024-30078: A New Threat to Windows Wi-Fi Drivers

Microsoft has confirmed the existence of a new and alarming vulnerability, CVE-2024-30078, in the Windows Wi-Fi driver. This vulnerability allows an attacker to execute arbitrary code remotely on a target system, potentially installing malware or running other malicious code over Wi-Fi without the user's knowledge. The vulnerability is embedded in Windows' common Wi-Fi driver code, making all Windows 11 users susceptible.

An unauthenticated attacker could send a malicious networking packet to a nearby system using a Wi-Fi networking adapter, enabling remote code execution. This zero-click attack requires no user interaction for exploitation. A malicious actor can target a specific machine with a specially crafted packet, enabling the execution of remote code on the target machine. The severity score assigned to this vulnerability is 8.8. While the exploit requires the attacker to be on the same network as the target PC, no other prior access is needed. This vulnerability also affects Windows on ARM laptops.

Exploiting this vulnerability necessitates the attacker being within proximity of the target system to send and receive radio transmissions.

What is a CVE?

CVEs, or Common Vulnerabilities and Exposures, are a maintained list of vulnerabilities and exploits in computer systems. These exploits can affect anything from phones to PCs, servers, or software. CVEs themselves don’t provide details on impact, implementation, or other effects of a vulnerability; instead, they focus on providing developers with a unique way of referencing and referring to unique exploits. Once a vulnerability is made public, it’s given a name in the format CVE-XXXX-XXXX.

Other databases contain more information on fixes and exploits, such as the National Vulnerability Database (NVD). There are also scoring systems for CVEs, like the CVSS (Common Vulnerability Scoring System), which assigns a score based on categories such as ease of exploitation, required prior access or authentication, and the potential impact of the exploit.

Is My Computer at Risk?

If you haven’t updated your Windows to the latest version, you should do so immediately. This exploit was likely disclosed responsibly to Microsoft by either an internal security team or a third party. It’s common for responsible disclosures of this nature to be patched, with some details released before full confirmation. This practice gives the public time to update their machines before exact details are known.

Microsoft's disclosure states that they do not believe the vulnerability has been maliciously exploited yet, but this is not a guarantee. The mere knowledge that a driver-level remote code execution vulnerability exists in Windows makes it a lucrative target for malicious groups. Many online groups are likely attempting to reverse-engineer this vulnerability right now. It’s also possible that threat actors unknown to Microsoft have previously exploited this vulnerability without Microsoft's awareness.

How Was This Vulnerability Introduced?

As the exact exploit details are still not publicly released, it’s impossible to determine when or how this exploit was introduced. We know it affects all currently supported versions of Windows, but it’s unclear whether older versions are also impacted.

Update: 25 Jun 2024
Wi-Fi Drivers for Intel Wireless Adapters

Wi-Fi Drivers for Intel Wireless Adapters download for free to PC or mobile

4
914 reviews
2052 downloads

News and reviews about Wi-Fi Drivers for Intel Wireless Adapters

Loading...