Query Details
// Zero-Day 🪲 CVE-2024-49039 // https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49039 // A KQL query to detect an authenticated attacker who initially runs a low-privilege AppContainer, which is later elevated with privileges, referencing the Microsoft CVE-2024-49039 Windows Task Scheduler Elevation of Privilege Vulnerability. let VulnerableEndpoint = DeviceTvmSoftwareVulnerabilities | where CveId == "CVE-2024-49039" | distinct DeviceName; let VulnerableEPwithAppContainer = DeviceProcessEvents | where ProcessCommandLine contains "/appcontainer" | where DeviceName has_any(VulnerableEndpoint) | distinct DeviceName; DeviceProcessEvents | where DeviceName has_any(VulnerableEPwithAppContainer) | where ProcessTokenElevation == "TokenElevationTypeFull"
This KQL query is designed to detect potential exploitation of a specific security vulnerability, CVE-2024-49039, which involves privilege escalation through the Windows Task Scheduler. Here's a simplified breakdown of what the query does:
Identify Vulnerable Devices:
DeviceTvmSoftwareVulnerabilities table. It creates a list of device names that are affected.Find Devices Running AppContainers:
Detect Privilege Escalation:
ProcessTokenElevation being "TokenElevationTypeFull". This suggests that an attacker might have successfully elevated privileges on a vulnerable device.In summary, this query helps security analysts detect if an attacker has exploited the CVE-2024-49039 vulnerability to elevate privileges on a device that initially ran a low-privilege AppContainer.

Steven Lim
Released: November 15, 2024
Tables
Keywords
Operators