CVE-2024-38063
CRITICALWindows TCP/IP < - RCE
Title source: llmDescription
Windows TCP/IP Remote Code Execution Vulnerability
Exploits (35)
nomisec
WORKING POC
14 stars
by diegoalbuquerque · poc
https://github.com/diegoalbuquerque/CVE-2024-38063
nomisec
WORKING POC
6 stars
by haroonawanofficial · poc
https://github.com/haroonawanofficial/AI-CVE-2024-38063-0-DAY
nomisec
WORKING POC
4 stars
by PumpkinBridge · poc
https://github.com/PumpkinBridge/Windows-CVE-2024-38063
nomisec
WORKING POC
1 stars
by jip-0-0-0-0-0 · poc
https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner
nomisec
WRITEUP
by RohitMalik7 · poc
https://github.com/RohitMalik7/cve-2024-38063-detection-mitigation-system
nomisec
WRITEUP
by SALMA-ESSAOUD · poc
https://github.com/SALMA-ESSAOUD/CVE-CVSS--CVE-2024-38063-IPv6-TCP-IP-Remote-Code-Execution-Analysis
nomisec
WORKING POC
by arrhenius975 · poc
https://github.com/arrhenius975/CVE-2024-38063-Exploit-Refactoring
nomisec
WORKING POC
by FrancescoDiSalesGithub · poc
https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063
nomisec
WORKING POC
by cyberzeuspakistan · poc
https://github.com/cyberzeuspakistan/CVE-2024-38063-Research-Tool
nomisec
SCANNER
by dweger-scripts · poc
https://github.com/dweger-scripts/CVE-2024-38063-Remediation
Scores
CVSS v3
9.8
EPSS
0.8988
EPSS Percentile
99.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-191
Status
published
Products (17)
microsoft/windows_10_1507
< 10.0.10240.20751
microsoft/windows_10_1607
< 10.0.14393.7259
microsoft/windows_10_1809
< 10.0.17763.6189
microsoft/windows_10_21h2
< 10.0.19044.4780
microsoft/windows_10_22h2
< 10.0.19045.4780
microsoft/windows_11_21h2
< 10.0.22000.3147
microsoft/windows_11_22h2
< 10.0.22621.4037
microsoft/windows_11_23h2
< 10.0.22631.4037
microsoft/windows_11_24h2
< 10.0.26100.1457
microsoft/windows_server_2008
... and 7 more
Published
Aug 13, 2024
Tracked Since
Feb 18, 2026