CVE-2024-20690: CWE-310: Cryptographic Issues in Microsoft Windows 10 Version 1809
Windows Nearby Sharing Spoofing Vulnerability
AI Analysis
Technical Summary
CVE-2024-20690 is a cryptographic vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Nearby Sharing feature. The vulnerability is classified under CWE-310, which relates to the use of insufficiently protected cryptographic mechanisms. Nearby Sharing is a Windows feature that allows users to share files, links, and other content wirelessly with nearby devices using Bluetooth and Wi-Fi. This vulnerability enables an attacker to perform spoofing attacks by exploiting weaknesses in the cryptographic protections that verify the authenticity of shared data or devices. The CVSS 3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as accepting a sharing prompt. The vulnerability impacts the integrity of the data shared (I:H) but does not affect confidentiality or availability. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker within wireless range to impersonate a trusted device or manipulate shared content, potentially leading to the delivery of malicious files or misinformation. The cryptographic flaw undermines the trust model of Nearby Sharing, making it possible to bypass intended security checks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially in environments where Windows 10 Version 1809 is still in use and Nearby Sharing is enabled. The integrity compromise could lead to the distribution of malicious payloads or tampered data within corporate networks or between employees, potentially facilitating lateral movement or social engineering attacks. Although confidentiality is not directly impacted, the manipulation of shared content could disrupt business operations or lead to misinformation. Organizations with mobile or remote workforces using Nearby Sharing in office or public environments are particularly at risk due to the network-based attack vector. Given that Windows 10 Version 1809 is an older release, many enterprises may have upgraded, but legacy systems in critical infrastructure or industrial environments might still be vulnerable. The lack of known exploits reduces immediate risk, but the presence of a public CVE and medium severity score suggests that attackers could develop exploits, especially targeting sectors with high-value data or critical operations.
Mitigation Recommendations
European organizations should first identify and inventory all systems running Windows 10 Version 1809 with Nearby Sharing enabled. As no official patch links are currently available, organizations should consider disabling Nearby Sharing on vulnerable systems as a temporary mitigation to prevent exploitation. This can be done via Group Policy or registry settings to restrict or disable the feature. Network segmentation and wireless access controls should be enforced to limit the exposure of devices to untrusted networks or users. Monitoring for unusual Nearby Sharing activity or unexpected file transfers can help detect potential exploitation attempts. Organizations should also prioritize upgrading affected systems to newer Windows versions where this vulnerability is addressed. Additionally, user awareness training should emphasize caution when accepting Nearby Sharing requests, especially from unknown or unexpected sources. Implementing endpoint detection and response (EDR) solutions that can flag suspicious file sharing or device spoofing behavior will further reduce risk.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2024-20690: CWE-310: Cryptographic Issues in Microsoft Windows 10 Version 1809
Description
Windows Nearby Sharing Spoofing Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-20690 is a cryptographic vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Nearby Sharing feature. The vulnerability is classified under CWE-310, which relates to the use of insufficiently protected cryptographic mechanisms. Nearby Sharing is a Windows feature that allows users to share files, links, and other content wirelessly with nearby devices using Bluetooth and Wi-Fi. This vulnerability enables an attacker to perform spoofing attacks by exploiting weaknesses in the cryptographic protections that verify the authenticity of shared data or devices. The CVSS 3.1 base score is 6.5, indicating a medium severity level. The attack vector is network-based (AV:N), requiring no privileges (PR:N) but does require user interaction (UI:R), such as accepting a sharing prompt. The vulnerability impacts the integrity of the data shared (I:H) but does not affect confidentiality or availability. The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker within wireless range to impersonate a trusted device or manipulate shared content, potentially leading to the delivery of malicious files or misinformation. The cryptographic flaw undermines the trust model of Nearby Sharing, making it possible to bypass intended security checks.
Potential Impact
For European organizations, this vulnerability poses a moderate risk, especially in environments where Windows 10 Version 1809 is still in use and Nearby Sharing is enabled. The integrity compromise could lead to the distribution of malicious payloads or tampered data within corporate networks or between employees, potentially facilitating lateral movement or social engineering attacks. Although confidentiality is not directly impacted, the manipulation of shared content could disrupt business operations or lead to misinformation. Organizations with mobile or remote workforces using Nearby Sharing in office or public environments are particularly at risk due to the network-based attack vector. Given that Windows 10 Version 1809 is an older release, many enterprises may have upgraded, but legacy systems in critical infrastructure or industrial environments might still be vulnerable. The lack of known exploits reduces immediate risk, but the presence of a public CVE and medium severity score suggests that attackers could develop exploits, especially targeting sectors with high-value data or critical operations.
Mitigation Recommendations
European organizations should first identify and inventory all systems running Windows 10 Version 1809 with Nearby Sharing enabled. As no official patch links are currently available, organizations should consider disabling Nearby Sharing on vulnerable systems as a temporary mitigation to prevent exploitation. This can be done via Group Policy or registry settings to restrict or disable the feature. Network segmentation and wireless access controls should be enforced to limit the exposure of devices to untrusted networks or users. Monitoring for unusual Nearby Sharing activity or unexpected file transfers can help detect potential exploitation attempts. Organizations should also prioritize upgrading affected systems to newer Windows versions where this vulnerability is addressed. Additionally, user awareness training should emphasize caution when accepting Nearby Sharing requests, especially from unknown or unexpected sources. Implementing endpoint detection and response (EDR) solutions that can flag suspicious file sharing or device spoofing behavior will further reduce risk.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-11-28T22:58:12.118Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9836c4522896dcbea95e
Added to database: 5/21/2025, 9:09:10 AM
Last enriched: 6/26/2025, 8:51:44 AM
Last updated: 8/14/2025, 3:18:24 AM
Views: 17
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.