Patch
CVE-2024-30051
with vRx
Vulnerability Overview
CVE Name
CVE-2024-30051
Severity
7.8
High
CVE Description
Windows DWM Core Library Elevation of Privilege Vulnerability
Show more
Show less
Latest Patch info
Patch Name
secure@microsoft.com
Date
16.05.2024
Script

Script Type
Detection script
🔒 Detect if Your System is Vulnerable to CVE-2024-30051
This script will help you check whether your Windows system is vulnerable to the critical CVE-2024-30051, a heap-based buffer overflow vulnerability in the Windows Desktop Window Manager (DWM). The vulnerability could allow attackers to escalate privileges to SYSTEM level.
🔍 How it works:
This script compares your system's build version against known vulnerable and patched builds. It checks for relevant KB updates and determines if a newer build is installed. If a newer build or KB is detected, the script confirms that your system is not vulnerable. Otherwise, it alerts you that your system may be at risk.
⚠️ Why it matters:
CVE-2024-30051 is actively exploited in the wild, allowing attackers to gain SYSTEM privileges on unpatched machines. Implementing this detection script ensures your systems are protected by checking for essential security updates, helping to mitigate potential exploitation.
Read more
Read less
Affected OS & Apps
Windows 11 23H2
by
Microsoft
Windows 11 22H2
by
Microsoft
Windows 10 22H2
by
Microsoft
Show more
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Patch faster and better with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.