Windows TCP/IP Remote Code Execution Vulnerability: What You Should Know
by Michael Teske and Matthew Lloyd Davies
Discover the key information you need to know about the latest critical Windows vulnerability and what it means for your organization.
What you'll learn
CVE-2024-38063 is a zero-click, wormable vulnerability in the IPv6 TCP/IP stack of Microsoft Windows. It enables attackers to remotely execute arbitrary code on affected systems without any user interaction. If exploited, the vulnerability could allow attackers to remotely execute arbitrary code, potentially leading to full system compromise, denial of service conditions, and unauthorized access to sensitive information. In this course, you’ll understand what this vulnerability means to you, and the steps you need to take to mitigate your organization’s exposure.
About the authors
Michael Teske is a principal security author with Pluralsight helping people build their skills toolkit. Michael has 25+ years of experience in the IT Ops/Cloud/Cybersecurity industry including 17 of those years as an IT instructor at a technical college, focusing on Microsoft server infrastructure, security and automation. Michael attained his MBA with an emphasis in Computer Information System Security several years ago. Michael still keeps up with the industry as an independent consultant in ... morehis spare time. Michael finds personal and professional growth by helping others discover the world of technology by sharing his passion as a tech enthusiast in all aspects. He understands the worker shortage in the cybersecurity space and continues to be an advocate for an industry that has provided a fulfilling career for himself.
Matt is a cyber security author and researcher here at Pluralsight. A certified penetration tester and incident handler, he created Pluralsight's CompTIA Pentest+ Specialized Attacks courses as well our courses on wireless, ICS/OT and hardware hacking. Matt has also helped to build our security labs portfolio; labs that help you get hands-on to understand the threats and vulnerabilities your organization faces today. With a background in Chemical Engineering, Matt's focus is on the security ... moreof Operational Technology, and particularly Industrial Control Systems. With the explosive growth of Industry 4.0 and the Industrial Internet of Things, Matt is passionate about educating the next generation of cyber security professionals to front up to the challenges faced by critical national infrastructure organizations around the world.