Windows TCP/IP Remote Code Execution Vulnerability
- FEBRUARY 26TH, 2024
- 1min read
Introduction
A vulnerability, CVE-2024-38063 MSRC of high severity, which impacts all Windows systems using IPv6 has been identified. It allows unauthenticated attackers to repeatedly send IPv6 packets, including specially crafted ones, to a Windows machine, enabling remote code execution. This vulnerability is self-replicating and does not require attacker privileges or user login.
Steps to Take
- Install Updates: Apply the latest Microsoft patch.
- Disable IPv6: Follow the steps below to mitigate the risk.
How to Disable IPv6
- Go to the Control Panel and click Network and Internet.
- Click Network and Sharing Centre, then View network status and tasks.
- Click your network adapter and select Properties.
- Uncheck Internet Protocol Version 6 (TCP/IPv6) and click OK.
Note: A restart may be required for updates to take effect.
Explore more CIL Advisories
Phishing Emails
IntroductionPhishing attacks are becoming increasingly sophisticated, with malicious actors exploiting current events like the Paris 2024 Olympics Games to run…
DECEMBER 16TH, 2024
Read More
Preventing Deep Fake Scams
IntroductionMalicious actors always find creative ways to defraud unsuspecting individuals; deep fake scams are one of the latest ways with…
DECEMBER 9TH, 2024
Read More
Trouble Looms: Ransomware Attacks on the Rise
IntroductionRansomware is a type of malware which prevents you from accessing your device and the data stored on it, usually…
DECEMBER 2ND, 2024
Read MoreNever miss a CIL Security Advisory
Stay informed with the latest security updates and insights from CIL.