overview
Microsoft has recently patched a Windows Kernel privilege escalation flaw, tracked as CVE-2024-21338 (CVSS 7.8). This vulnerability, impacting various Windows operating systems, is being actively exploited by the notorious North Korean threat actor, Lazarus.
The vulnerability affects the ‘appid.sys’ driver associated with Microsoft’s AppLocker security feature. Exploitation of CVE-2024-21338 allows for a fileless kernel attack. Threat actors are then able to evade the detection mechanism and escalate privileges. Lazarus utilized this exploit to establish kernel-level access and manipulate kernel objects with an updated version of the FudModule rootkit.
According to Avast researchers, exploiting a zero-day vulnerability in a built-in driver provides attackers with unmatched stealth, eliminating the need for custom drivers and allowing fileless kernel attacks. This evasion of detection mechanisms extends to systems with driver allowlisting, despite the irony of CVE-2024-21338 affecting an AppLocker driver.
Microsoft addressed the issue in their February 2024 Patch Tuesday updates, urging immediate system updates to prevent potential exploits. Lazarus has been exploiting CVE-2024-21338 since August 2023. Avertium recommends that users install the latest security updates from Microsoft as soon as possible.
INDICATORS OF COMPROMISE (IoCs)
A YARA rule and Targeted ETW Provider GUIDs can be found here.
SUPPORTING DOCUMENTATION