November 16, 2024 by @DKob & @N3TCR4SH

A critical flaw with a 9.8 CVSS score (CRITICAL) in the Windows TCP/IP stack has transformed IPv6 from a revolutionary upgrade into an unexpected gateway for remotely compromising any Windows machine with IPv6 enabled. (IPv6 is enabled by default) Buried deep within the kernel, this vulnerability allows attackers to trigger 0-click RCE or DoS attacks. The implications are significant: no user interaction is required, just carefully crafted packets that exploit weaknesses in IPv6. This article examines how this vulnerability has evolved into a potent tool for exploiting Windows systems. {CVE-2024-38063}

<aside> <img src="https://prod-files-secure.s3.us-west-2.amazonaws.com/b0edf093-4014-4603-af27-b4044f283218/6993b574-96b5-46e6-90f5-a7aea46521fa/gettyimages-517398572sq.jpg" alt="https://prod-files-secure.s3.us-west-2.amazonaws.com/b0edf093-4014-4603-af27-b4044f283218/6993b574-96b5-46e6-90f5-a7aea46521fa/gettyimages-517398572sq.jpg" width="40px" />

“Technological progress has merely provided us with more efficient means for going backwards”

~ Aldous Huxley

</aside>

CVE - CVE-2024-38063

CVE Information

Name CVSS Score Vector Complexity User Interaction Risks Patched
CVE-2024-38063 9.8 Network Low None RCE DoS

How it works

This explanation will be presented in two parts: first, a general overview, followed by a detailed technical analysis for those seeking a deeper understanding.

General Overview

Title: IPv6 Header | Source: CSTALEEM

Title: IPv6 Header | Source: CSTALEEM

Title: Extension Headers | Source: Wikipedia

Title: Extension Headers | Source: Wikipedia

Technical Analysis {Reverse Engineering the Patch}