Microsoft has confirmed a severe Wi-Fi vulnerability in Windows, designated as CVE-2024-30078, with a high severity rating of 8.8 out of 10. This vulnerability allows unauthenticated attackers to execute remote code on affected devices without any user interaction, as long as they are physically close to the target. All supported versions of Windows are impacted, and the flaw can be exploited without requiring any special access conditions.
Security experts warn that this vulnerability is particularly dangerous in environments with many connected devices, such as hotels and trade shows, where attackers can easily target users. Jason Kikta, chief information security officer at Automox, stresses the importance of applying the latest patches immediately to protect against potential attacks. The absence of user interaction and the ability to bypass network-level detection make this a critical security threat.
For those using versions of Windows that no longer receive security updates, it’s essential to upgrade to a supported version as soon as possible. Kikta also recommends using endpoint detection to monitor for suspicious activity if immediate patching is not possible. The risk of running outdated software is significant, and this vulnerability underscores the need for maintaining up-to-date security measures.
Kikta highlights that the threat bypasses most threat modeling and network-based defenses, making it an urgent priority to patch systems. With publicly available exploitation tools expected soon, the window to secure systems before widespread attacks occur is narrowing rapidly. Security experts agree that addressing this vulnerability should be a top priority to prevent potential breaches.
Reference: