CVE-2024-38063 - Or, IPv6 fucks everyone again, and still nobody actually uses it

FYI disabling ipv6 doesn't seem to work against this vulnerability, since it seems that the attack takes place before your firewall can block ipv6 packets. seems like a problem with the windows ip/tcp stack implementation. Just update.
View attachment 6311747
The firewall doesn't help because the Windows IPv6 stack has to accept and analyze the packets before it can do any firewalling, and it's here where the attack sinks its teeth into your system. Disabling the stack means the packets get discarded as junk before the system can read deep enough into the mangled part to get owned and it's official Microsoft advice for temporary mitigation.
 
This is part of the reason an acquaintance of mine shuns IPv6. I asked him about it years ago, since IPv6 didn't seem too bad to me at the time, and he told me that the very implementations are a constant source of vulnerabilities that simply don't occur with IPv4. I really don't think IPv6 is ever going to matter.
 
This is part of the reason an acquaintance of mine shuns IPv6. I asked him about it years ago, since IPv6 didn't seem too bad to me at the time, and he told me that the very implementations are a constant source of vulnerabilities that simply don't occur with IPv4. I really don't think IPv6 is ever going to matter.
It's pretty much turned into a two tiered system where losers with shit ISPs enjoy IPv6 and CGNAT while premium connections get a real public facing IPv4 with an optional IPv6 on the side.
 
The info isn't out yet but I have a theory: Even if your network and ISP doesn't support ipv6 I'm guessing you could use this to escalate privileges if an attacker has some kind of a basic foothold. It's more relevant to sysadmins probably (lmao @ anyone running windows in production) but install your patches kiwibros.
 
It's pretty much turned into a two tiered system where losers with shit ISPs enjoy IPv6 and CGNAT while premium connections get a real public facing IPv4 with an optional IPv6 on the side.
What’s hilarious is some ISPs are rolling out brand new fiber in 2024 that can’t do IPv6 for god knows what reason. What a shit show it’s been.
 
Hackers can send fancy ipv6 packets to your machine which, though an integer underflow as the vulnerability mechanism, runs remote code on your machine. This code can install further malware and backdoors.
explanation for extra retards like me, speedy thing goes in speedy thing comes out.
 
The info isn't out yet but I have a theory: Even if your network and ISP doesn't support ipv6 I'm guessing you could use this to escalate privileges if an attacker has some kind of a basic foothold. It's more relevant to sysadmins probably (lmao @ anyone running windows in production) but install your patches kiwibros.
Absolutely, you could just hose packets into the multicast address for free easy godmode if the network isn't locked down properly. Hell, plug into random jacks at offices when nobody is looking and hope you get lucky with an unsecured switchport.

edit because I ain't double posting
What’s hilarious is some ISPs are rolling out brand new fiber in 2024 that can’t do IPv6 for god knows what reason. What a shit show it’s been.
Even better, I've seen a fiber ISP roll out CGNAT alongside a lack of IPv6. You're paying 60 buckaroonies a month for a gigabit hose and you want your own IP address? Tough luck bitch nigga, write to our customer service and hope the pajeets are merciful enough this time of the month to give you one from our tiny ass address block.
 
Last edited:
Back