Skip to main content

CVE-2024-20652: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-20652cvecve-2024-20652cwe-73
Published: Tue Jan 09 2024 (01/09/2024, 17:57:00 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows HTML Platforms Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 07/06/2025, 00:28:18 UTC

Technical Analysis

CVE-2024-20652 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is categorized under CWE-73, which involves External Control of File Name or Path. This vulnerability specifically targets the Windows HTML Platforms, allowing an attacker to bypass security features related to file path handling. The vulnerability enables an attacker to manipulate external input that controls file names or paths, potentially leading to unauthorized access or modification of files. The CVSS 3.1 base score is 8.1, indicating a high severity with the following vector: Network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The exploitability is somewhat limited by the high attack complexity, but the lack of required privileges and user interaction makes it a significant threat if an attacker can craft a suitable network-based exploit. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow remote attackers to bypass security restrictions by controlling file paths, potentially leading to arbitrary code execution, data corruption, or denial of service. This is particularly concerning for environments still running the older Windows 10 1809 version, which is out of mainstream support and may lack comprehensive security updates.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those still operating legacy Windows 10 Version 1809 systems. The ability to remotely exploit this vulnerability without authentication or user interaction means attackers could compromise critical systems silently. The high impact on confidentiality, integrity, and availability could lead to data breaches, system downtime, or unauthorized system control. Sectors such as finance, healthcare, government, and critical infrastructure in Europe could be severely affected due to the sensitive nature of their data and the criticality of their operations. Additionally, organizations that have not migrated to newer Windows versions or have delayed patching strategies are at increased risk. The lack of known exploits in the wild currently provides a window for mitigation, but the potential for future exploitation remains high. This vulnerability could also be leveraged in targeted attacks or ransomware campaigns, amplifying its impact on European entities.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying all systems running Windows 10 Version 1809. Immediate mitigation steps include: 1) Applying any available security updates or patches from Microsoft as soon as they are released. Since no patch links are currently provided, organizations should monitor Microsoft's official security advisories closely. 2) Implement network-level protections such as strict firewall rules to limit exposure of vulnerable systems to untrusted networks, especially the internet. 3) Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and prevent exploitation attempts. 4) Consider upgrading or migrating affected systems to supported Windows versions that receive regular security updates. 5) Conduct security awareness training to ensure IT staff recognize the risks of running unsupported OS versions and the importance of timely patching. 6) Use network segmentation to isolate legacy systems from critical infrastructure to reduce potential lateral movement. 7) Monitor logs and network traffic for unusual file path access patterns or attempts to exploit HTML platform components. These targeted actions go beyond generic advice by focusing on legacy system management, network exposure reduction, and proactive monitoring tailored to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-11-28T22:58:12.114Z
Cisa Enriched
false
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbea841

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 7/6/2025, 12:28:18 AM

Last updated: 7/27/2025, 1:19:40 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats