Critical Windows TCP/IP Vulnerability (CVE‑2024‑38063) Allows Remote Code Execution via IPv6
Microsoft has disclosed a critical Windows TCP/IP stack vulnerability (CVE‑2024‑38063) with a CVSS 9.8 score that enables remote code execution through specially crafted IPv6 packets, is wormable, and can spread laterally across internal networks, prompting immediate patch installation or IPv6 disabling.
Microsoft Windows has recently been found to contain a severe security vulnerability with a CVSS 3.1 score of 9.8 out of 10.
The issue, identified as CVE‑2024‑38063 by the Kunlun Lab of Cyber Kunlun, resides in the Windows TCP/IP network stack and allows attackers to execute code remotely by sending specially crafted IPv6 packets.
Kunlun’s security researcher Wei explained that, due to the extreme severity of the flaw, detailed technical information will not be disclosed publicly in the short term to prevent malicious exploitation.
He also noted that blocking IPv6 on the local Windows firewall does not mitigate the vulnerability, as the exploit is triggered before firewall processing.
Trend Micro researchers have classified the flaw as wormable, meaning it can propagate laterally within an internal network; if one device is compromised, other devices on the same network may also be attacked.
Both Microsoft and security researchers strongly advise all users to apply the available patch immediately; if patching is not possible, disabling IPv6 is recommended as a temporary mitigation.
Source: Kuai Technology
Editor: HeiBai
DevOps Operations Practice
We share professional insights on cloud-native, DevOps & operations, Kubernetes, observability & monitoring, and Linux systems.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.