Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability (2024)

Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability (1)

Microsoft recently plugged a security hole in the Windows Wi-Fi driver. This exploit would have allowed attackers to run malicious code on vulnerable systems over Wi-Fi. The vulnerability affects all modern versions of Windows and Windows Server, and the attacker doesn’t need to have had prior access to the target computer.

While Microsoft acknowledges there were no known active exploits of the security hole, the weakness is described as having a low attack complexity. It’s described in CVE-2024-30078 with a maximum severity of “Important.” An attacker need only be within Wi-Fi range of the computer to send a specially crafted network packet to the target PC and exploit the vulnerability.

The Wi-Fi attack bypasses all authentication protocols, does not require prior access rights, and requires no user interaction at all. Because of this, in theory, an attacker could slip malware to Windows users logging into public Wi-Fi networks completely undetected. Such hotspots are common at hotels, airports, and in cafes.

Microsoft considers exploitation of the vulnerability “less likely,” but these announcements often bring bad actors out of the woodwork. The ease with which someone could take advantage of the exploit is also troublesome. The weakness, categorized as an Improper Input Validation security vulnerability, exists on all common versions of Windows.

This includes unpatched versions of Windows 10 and Windows 11. It also includes all Windows Server versions from 2008 on. The patch eliminating the security vulnerability was released on June 11. The same patch addresses 49 CVEs in Windows and Windows components, Office and Office components, Azure Dynamic Business Central, and Visual Studio.

Only one of the patched security holes was rated as Critical, a vulnerability in Microsoft Message Queuing that allowed remote, unauthenticated attackers to run malicious code with elevated privileges. The rest, including the aforementioned Wi-Fi driver security hole, were rated as Severity: Important. None are known to be actively exploited.

Patch Tuesday for June is an important one, so get those updates installed, friends and neighbors.

Stay On the Cutting Edge: Get the Tom's Hardware Newsletter

Get Tom's Hardware's best news and in-depth reviews, straight to your inbox.

Jeff Butts

Freelance News Writer

More about windows

Microsoft kills Win + C shortcut to promote dedicated Copilot key, drive PC salesGone, but not forgotten: Recall feature disappears from latest Windows Insider builds

Latest

Several AI companies said to be ignoring robots dot txt exclusion, scraping content without permission: report
See more latest►

3 CommentsComment from the forums

  • FoxTread3

    June 13, 2024 - I think this article is important because I get the impression that a lot of people. Naively use free Wi-Fi in all kinds of places. It would be nice if the reporter writing this article, had provided a list of devices that are available that protect devices like laptops when using them in public places. He also could offer links to Tom's Hardware articles that list products and services that prevent laptops from being hacked when using free/public Wi-Fi. It isn't lost on me that people who haven't locked down their home Wi-Fi could be at risk of being hacked just like free Wi-Fi. I had a friend who was very tech savvy who purposely left his Wi-Fi unlocked so that other people could use it. I told him that he had a good heart, but was missing the point, crazy, and to lock down his Wi-Fi immediately. Which he did. Stay well all. :giggle:

    Reply

  • TJ Hooker

    FoxTread3 said:

    June 13, 2024 - I think this article is important because I get the impression that a lot of people. Naively use free Wi-Fi in all kinds of places. It would be nice if the reporter writing this article, had provided a list of devices that are available that protect devices like laptops when using them in public places. He also could offer links to Tom's Hardware articles that list products and services that prevent laptops from being hacked when using free/public Wi-Fi. It isn't lost on me that people who haven't locked down their home Wi-Fi could be at risk of being hacked just like free Wi-Fi. I had a friend who was very tech savvy who purposely left his Wi-Fi unlocked so that other people could use it. I told him that he had a good heart, but was missing the point, crazy, and to lock down his Wi-Fi immediately. Which he did. Stay well all. :giggle:

    FYI, there is nothing in the vulnerability description to indicate that the attacker needs to be connected to the same WiFi network as you. Merely that they have to be within range of your device's WiFi adapter. The Tom's article ads the bit linking this to public/open WiFi networks, but I don't see where they're getting that from. The author may have simply misunderstood the issue.

    I think the risks of connecting to open/public WiFi are generally overblown. But leaving your home WiFi network open does seem like a terrible idea.

    Edit: Or maybe I'm the one misunderstanding. I don't know enough about 802.11, maybe the notion of sending a WiFi packet to a device implicitly means both devices are already connected to the same access point/on the same WLAN.

    Reply

  • FoxTread3

    June 12, 2024 - Thank you for your comments. I have no reason to question anything you've said. However.. :giggle: as a long time follower of various Tech Guru's, Tech shows and Tech YouTube channels. I am aware of various issues regarding Wi-Fi. Some years back it was highly recommended that people change their home routers' passwords, because some companies sold routers with the same password, and anyone within range of the router and knew the router's password could join the network. There was a lot of discussion about WEP, WPA and WPA2, ( I believe we are up to WPA3 now). If you are unfamiliar with any of this, do a Google search for comparisons and explanations. I also remember watching nerds "War driving" live back in the early 2000s, looking for residential open access points. They found quite a number of networks that they could join. Wikipedia has an article on Wi-Fi War driving if you are interested. Lastly, I know of two reported incidents, one in the past couple of years and the other within the past year. Where neighbors complained to the owners of Wi-Fi networks. When the owners changed their passwords. One incident I believe happened in California, where an older woman approached her neighbor complaining that she couldn't get on the internet because he changed his password. A similar case happened in a some small town in England where an older man confronted his neighbor, because his neighbor had changed his Wi-Fi password. Aside from the gall that these older people displayed, it showed the total lack of understanding of the Tech they were using. To my knowledge, aside from the theft of service, and loss of privacy. There is the legal responsibility that is on the owner of the network. So, if a network has been found to have been used for something illegal. I believe the owner of the Wi-Fi network is held legally accountable, with possible punishment of some sort.

    Reply

Most Popular
Retro Pocket 386 Win 95 laptop arrives for less than $200 — comes with 40MHz 386 SX processor, 8 MB RAM, and replaceable graphics
Intelbroker claims they hacked Apple in the same week as AMD
Microsoft kills Win + C shortcut to promote dedicated Copilot key, drive PC sales
Modder builds a totally fanless 'retro-futuristic' mini PC — attached to a USB4-powered bank of SSDs
Gone, but not forgotten: Recall feature disappears from latest Windows Insider builds
Intel Battlemage display drivers coming soon for Linux — functional drivers to focus on power efficiency first
TSMC explores using 510x515 mm rectangular silicon wafers — tripling the usable area of current 300mm diameter tech
This Raspberry Pi Pico project will sort your candies by color
Minisforum DEG1 eGPU dock launched at $99 — open-air device supports up to RTX 4090 and OCuLink connections
SkatterBencher is working on a telemetry tool for the Raspberry Pi
Supercomputer designer shrinks the Cray C90 to wristwatch size … sort of
Windows security hole allows attackers to install malware via Wi-Fi — new patch plugs gaping vulnerability (2024)
Top Articles
Latest Posts
Article information

Author: Geoffrey Lueilwitz

Last Updated:

Views: 5364

Rating: 5 / 5 (60 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Geoffrey Lueilwitz

Birthday: 1997-03-23

Address: 74183 Thomas Course, Port Micheal, OK 55446-1529

Phone: +13408645881558

Job: Global Representative

Hobby: Sailing, Vehicle restoration, Rowing, Ghost hunting, Scrapbooking, Rugby, Board sports

Introduction: My name is Geoffrey Lueilwitz, I am a zealous, encouraging, sparkling, enchanting, graceful, faithful, nice person who loves writing and wants to share my knowledge and understanding with you.