Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability
If you log into public Wi-Fi hotspots, like those at airports, hotels, and cafes, your unpatched PC could be vulnerable.
Microsoft recently plugged a security hole in the Windows Wi-Fi driver. This exploit would have allowed attackers to run malicious code on vulnerable systems over Wi-Fi. The vulnerability affects all modern versions of Windows and Windows Server, and the attacker doesn’t need to have had prior access to the target computer.
While Microsoft acknowledges there were no known active exploits of the security hole, the weakness is described as having a low attack complexity. It’s described in CVE-2024-30078 with a maximum severity of “Important.” An attacker need only be within Wi-Fi range of the computer to send a specially crafted network packet to the target PC and exploit the vulnerability.
The Wi-Fi attack bypasses all authentication protocols, does not require prior access rights, and requires no user interaction at all. Because of this, in theory, an attacker could slip malware to Windows users logging into public Wi-Fi networks completely undetected. Such hotspots are common at hotels, airports, and in cafes.
Microsoft considers exploitation of the vulnerability “less likely,” but these announcements often bring bad actors out of the woodwork. The ease with which someone could take advantage of the exploit is also troublesome. The weakness, categorized as an Improper Input Validation security vulnerability, exists on all common versions of Windows.
This includes unpatched versions of Windows 10 and Windows 11. It also includes all Windows Server versions from 2008 on. The patch eliminating the security vulnerability was released on June 11. The same patch addresses 49 CVEs in Windows and Windows components, Office and Office components, Azure Dynamic Business Central, and Visual Studio.
Only one of the patched security holes was rated as Critical, a vulnerability in Microsoft Message Queuing that allowed remote, unauthenticated attackers to run malicious code with elevated privileges. The rest, including the aforementioned Wi-Fi driver security hole, were rated as Severity: Important. None are known to be actively exploited.
Patch Tuesday for June is an important one, so get those updates installed, friends and neighbors.
Stay On the Cutting Edge: Get the Tom's Hardware Newsletter
Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.
Jeff Butts has been covering tech news for more than a decade, and his IT experience predates the internet. Yes, he remembers when 9600 baud was “fast.” He especially enjoys covering DIY and Maker topics, along with anything on the bleeding edge of technology.
Microsoft temporarily halts Windows 11 24H2 update on PCs with select Ubisoft games — avoiding frequent freezing and black screen glitches in modern Assassin's Creed, Star Wars, and Avatar titles
Rebootless updates come to Windows 11 Enterprise and 365 for security updates — Microsoft releases hotpatching for Windows 11 Enterprise 24H2 and Windows 365 Preview Editions
-
FoxTread3 June 13, 2024 - I think this article is important because I get the impression that a lot of people. Naively use free Wi-Fi in all kinds of places. It would be nice if the reporter writing this article, had provided a list of devices that are available that protect devices like laptops when using them in public places. He also could offer links to Tom's Hardware articles that list products and services that prevent laptops from being hacked when using free/public Wi-Fi. It isn't lost on me that people who haven't locked down their home Wi-Fi could be at risk of being hacked just like free Wi-Fi. I had a friend who was very tech savvy who purposely left his Wi-Fi unlocked so that other people could use it. I told him that he had a good heart, but was missing the point, crazy, and to lock down his Wi-Fi immediately. Which he did. Stay well all. :giggle:Reply -
TJ Hooker
FYI, there is nothing in the vulnerability description to indicate that the attacker needs to be connected to the same WiFi network as you. Merely that they have to be within range of your device's WiFi adapter. The Tom's article ads the bit linking this to public/open WiFi networks, but I don't see where they're getting that from. The author may have simply misunderstood the issue.FoxTread3 said:June 13, 2024 - I think this article is important because I get the impression that a lot of people. Naively use free Wi-Fi in all kinds of places. It would be nice if the reporter writing this article, had provided a list of devices that are available that protect devices like laptops when using them in public places. He also could offer links to Tom's Hardware articles that list products and services that prevent laptops from being hacked when using free/public Wi-Fi. It isn't lost on me that people who haven't locked down their home Wi-Fi could be at risk of being hacked just like free Wi-Fi. I had a friend who was very tech savvy who purposely left his Wi-Fi unlocked so that other people could use it. I told him that he had a good heart, but was missing the point, crazy, and to lock down his Wi-Fi immediately. Which he did. Stay well all. :giggle:
I think the risks of connecting to open/public WiFi are generally overblown. But leaving your home WiFi network open does seem like a terrible idea.
Edit: Or maybe I'm the one misunderstanding. I don't know enough about 802.11, maybe the notion of sending a WiFi packet to a device implicitly means both devices are already connected to the same access point/on the same WLAN. -
FoxTread3 June 12, 2024 - Thank you for your comments. I have no reason to question anything you've said. However.. :giggle: as a long time follower of various Tech Guru's, Tech shows and Tech YouTube channels. I am aware of various issues regarding Wi-Fi. Some years back it was highly recommended that people change their home routers' passwords, because some companies sold routers with the same password, and anyone within range of the router and knew the router's password could join the network. There was a lot of discussion about WEP, WPA and WPA2, ( I believe we are up to WPA3 now). If you are unfamiliar with any of this, do a Google search for comparisons and explanations. I also remember watching nerds "War driving" live back in the early 2000s, looking for residential open access points. They found quite a number of networks that they could join. Wikipedia has an article on Wi-Fi War driving if you are interested. Lastly, I know of two reported incidents, one in the past couple of years and the other within the past year. Where neighbors complained to the owners of Wi-Fi networks. When the owners changed their passwords. One incident I believe happened in California, where an older woman approached her neighbor complaining that she couldn't get on the internet because he changed his password. A similar case happened in a some small town in England where an older man confronted his neighbor, because his neighbor had changed his Wi-Fi password. Aside from the gall that these older people displayed, it showed the total lack of understanding of the Tech they were using. To my knowledge, aside from the theft of service, and loss of privacy. There is the legal responsibility that is on the owner of the network. So, if a network has been found to have been used for something illegal. I believe the owner of the Wi-Fi network is held legally accountable, with possible punishment of some sort.Reply -
td47 It is a shame that the latest Monthly MS Update KB5039212 description was very vague, and gave the impression that it was ONLY a fix for an LSASS memory leak. However, if you look at the CVE report on this at:Reply
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30078
it mentions that for Windows 11 23H2 the 5039212 was a ROLLUP FIX, so DID contain this, and possibly other security fixes.