Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-21338: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-21338cvecve-2024-21338cwe-822
Published: Tue Feb 13 2024 (02/13/2024, 18:02:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kernel Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 09:05:01 UTC

Technical Analysis

CVE-2024-21338 is a vulnerability classified under CWE-822 (Untrusted Pointer Dereference) affecting the Windows kernel in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This flaw arises when the kernel improperly dereferences pointers that can be controlled or influenced by an untrusted source, leading to elevation of privilege. An attacker with limited privileges (local low-privilege user) can exploit this vulnerability to execute arbitrary code in kernel mode, thereby gaining elevated privileges. The vulnerability does not require user interaction but does require local access to the system. The CVSS v3.1 score of 7.8 reflects high severity, with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The exploitability factor is functional (E:F), and remediation level is official (RL:O) with confirmed report confidence (RC:C). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to its potential to allow attackers to bypass security boundaries and fully compromise affected systems. The lack of a patch link suggests that a fix may be pending or in development. This vulnerability is particularly dangerous because kernel-level compromise can undermine all security controls on the affected machine.

Potential Impact

If exploited, this vulnerability allows an attacker with local access and limited privileges to escalate their privileges to SYSTEM or kernel level, effectively gaining full control over the affected Windows 10 system. This can lead to unauthorized access to sensitive data, installation of persistent malware, disabling of security features, and disruption of system availability. Organizations relying on Windows 10 Version 1809, especially those in critical infrastructure, government, and enterprise environments, face increased risk of insider threats or lateral movement by attackers who have gained initial foothold. The impact extends to confidentiality, integrity, and availability of systems and data. Since the vulnerability requires local access, remote exploitation is less likely, but compromised or physically accessed devices remain vulnerable. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge.

Mitigation Recommendations

1. Apply official patches from Microsoft as soon as they become available for Windows 10 Version 1809 to remediate the vulnerability. 2. Until patches are released, restrict local access to systems running this version by enforcing strict access controls and monitoring physical and remote access. 3. Implement the principle of least privilege to limit user permissions and reduce the attack surface. 4. Use endpoint detection and response (EDR) tools to monitor for unusual kernel-level activity or privilege escalation attempts. 5. Disable or restrict use of legacy or unnecessary services and software that could be leveraged to gain local access. 6. Conduct regular audits of user accounts and system logs to detect suspicious behavior. 7. Educate users about the risks of local privilege escalation and enforce strong authentication mechanisms to prevent unauthorized access. 8. Consider upgrading to a more recent and supported Windows version if feasible, as Windows 10 Version 1809 is an older release with limited ongoing support.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:19.372Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeaa9e

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 2/28/2026, 9:05:01 AM

Last updated: 3/25/2026, 10:02:28 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses