


Fortra report disclosed a new security vulnerability in Windows drivers CVE-2024-6768 that could cause a blue screen of death to PCs running Windows 11/10 and Server 2022. Want to know the details of this CVE-2024-6768 Blue Screen of Death vulnerability? Please read this article by MiniTool.
Last month, millions of Windows PCs worldwide suffered one of the major global computer downtimes caused by the CrowdStrike Falcon flaw. Less than a month after the CrowdStrike Blue Screen of Death incident occurred, cybersecurity company Fortra disclosed another new Blue Screen of Death problem in a report: CVE-2024-6768 Blue Screen of Death vulnerability.
About CVE-2024-6768 Blue Screen of Death Vulnerability
Specifically, there is a new vulnerability in the Windows CLFS.sys (Public Log File System) driver that is responsible for logging applications and managing logs. This vulnerability was traced to CVE-2024-6768, resulting in a denial of service incorrect verification of the specified number in the input in the CLFS.sys driver (CWE-1284).
This error can lead to irrecoverable inconsistencies, triggering the KeBugCheckEx function, and ultimately leading to the infamous blue screen of death, a long-standing nightmare for Windows users.
The scope of impact of vulnerabilities
CVE-2024-6768 Blue Screen of Death vulnerability is indiscriminate and currently affects all versions of Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022, regardless of whether they have all the latest security patches installed.
Researcher Ricardo Narvaja has demonstrated the vulnerability through PoC (Proof of Concept) that uses specific values in .BLF files (file format in Windows CLFS). No user interaction is required, unprivileged users can make specific inputs to induce system crashes.
According to a report, potential problems arise, such as system instability and denial of service. Malicious users can repeatedly exploit the CVE-2024-6768 vulnerability, causing the affected system to crash continuously, interrupt operations and lead to potential data loss.
In terms of the severity of CVE-2024-6768 Blue Screen of Death, it is in the medium level, with a rating of 6.8 on CVSS (General Vulnerability Scoring System). The attack vector is local, meaning that malicious attackers need physical access to the machine to exploit the vulnerability, which to some extent limits the scope of potential attacks.
There is currently no fix for CVE-2024-6768 Blue Screen of Death, but there are some suggestions
According to a timeline released by Fortra, the company reported a proof-of-concept vulnerability to Microsoft on December 20, 2023, which Microsoft responded that their engineers were unable to reproduce. Finally, Fortra released the CVE-2024-6768 vulnerability on August 12, 2024.
Currently, due to the nature of the vulnerability, Microsoft has no mitigation or solution to fix the CVE-2024-6768 Blue Screen of Death issue. IT administrators should exercise caution and try to take some additional security measures when possible.
- Limit physical access to critical systems
- Monitor any abnormal activity that attempts to exploit this vulnerability
- Keep Windows systems up to date to reduce the risk of being exploited
Backup files to avoid data loss
If you are a regular user, the only thing you can do is to keep your data safe, because as mentioned above, duplicate system crashes can lead to potential data loss. For data backup, we recommend MiniTool ShadowMaker, a professional and best backup software for Windows 11/10/8.1/8/7 and Server 2016/2019/2022.
This backup utility plays an important role in file backup, folder backup, disk backup, and partition backup. Additionally, MiniTool ShadowMaker allows data backups to be periodically backed up by setting a time point of one day, one week, or one month. In addition, incremental and differential backups are supported, saving time and disk space.
Get it on your PC and follow the steps below to start the backup.
Step 1: Start the MiniTool ShadowMaker trial version on your Windows PC or server.
Step 2: Go to Backup > Source , select the content you want to back up, and click OK .
Step 3: Under Backup , click on the target to select a path (such as an external drive) to save the backup image.
Step 4: For Automatic Backup, click Options > Schedule Settings and configure a plan. Then, click Backup Now to start a full backup, and a scheduled backup will be created at the set time.
Please note that the URL of the image needs to be replaced with the actual accessible URL. I retained the original image order and format.
The above is the detailed content of CVE-2024-6768 BSOD: Everything to Know about the Blue Screen. For more information, please follow other related articles on the PHP Chinese website!

This article addresses the Windows "INVALID_DATA_ACCESS_TRAP" (0x00000004) error, a critical BSOD. It explores common causes like faulty drivers, hardware malfunctions (RAM, hard drive), software conflicts, overclocking, and malware. Trou

Article discusses editing Windows Registry, precautions, backup methods, and potential issues from incorrect edits. Main issue: risks of system instability and data loss from improper changes.

Article discusses managing Windows services for system health, including starting, stopping, restarting services, and best practices for stability.

What does the drive health warning in Windows Settings mean and what should you do when you receive the disk warning? Read this php.cn tutorial to get step-by-step instructions to cope with this situation.

This article identifies ene.sys as a Realtek High Definition Audio driver component. It details its function in managing audio hardware, emphasizing its crucial role in audio functionality. The article also guides users on verifying its legitimacy

This article addresses the failure of the Windows asio.sys audio driver. Common causes include corrupted system files, hardware/driver incompatibility, software conflicts, registry issues, and malware. Troubleshooting involves SFC scans, driver upda

The article explains how to use the Group Policy Editor (gpedit.msc) in Windows for managing system settings, highlighting common configurations and troubleshooting methods. It notes that gpedit.msc is unavailable in Windows Home editions, suggesting

Article discusses changing default apps for file types on Windows, including reverting and bulk changes. Main issue: no built-in bulk change option.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

Zend Studio 13.0.1
Powerful PHP integrated development environment

Atom editor mac version download
The most popular open source editor

SublimeText3 Chinese version
Chinese version, very easy to use