Skip to main content

CVE-2024-21348: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-21348cvecve-2024-21348cwe-122
Published: Tue Feb 13 2024 (02/13/2024, 18:02:34 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Internet Connection Sharing (ICS) Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:22:55 UTC

Technical Analysis

CVE-2024-21348 is a high-severity heap-based buffer overflow vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting build 10.0.17763.0. The flaw resides within the Internet Connection Sharing (ICS) component, which is responsible for enabling network connectivity sharing between devices. A heap-based buffer overflow occurs when data exceeding the allocated buffer size is written to the heap memory, potentially leading to memory corruption. In this case, the vulnerability can be triggered remotely without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). Exploiting this vulnerability allows an attacker to cause a denial of service (DoS) condition by crashing the ICS service or the entire system, thereby disrupting network connectivity and availability. The vulnerability does not impact confidentiality or integrity directly but severely affects availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in December 2023 and published in February 2024. Given the nature of ICS as a critical networking component, this vulnerability poses a significant risk to systems relying on ICS for network sharing, especially in environments where Windows 10 Version 1809 is still in use.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial, particularly for enterprises, public sector institutions, and service providers that utilize Windows 10 Version 1809 in their infrastructure. The denial of service caused by this heap overflow could disrupt internal network sharing capabilities, affecting business continuity and operational efficiency. Critical services relying on ICS for connectivity, such as remote work setups, IoT device management, or network segmentation, could be interrupted, leading to downtime and potential financial losses. Additionally, organizations in sectors like healthcare, finance, and government, where network availability is crucial, might face increased operational risks. Although no data breach or privilege escalation is indicated, the disruption of network services can indirectly affect security monitoring and incident response capabilities. The lack of required privileges or user interaction for exploitation increases the threat level, as attackers could remotely trigger the DoS condition with relative ease.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement specific mitigations beyond generic advice: 1) Identify and inventory all systems running Windows 10 Version 1809, prioritizing those with ICS enabled. 2) Where feasible, disable Internet Connection Sharing on systems that do not require it to reduce the attack surface. 3) Employ network segmentation and firewall rules to restrict access to ICS-related network ports and services, limiting exposure to untrusted networks. 4) Monitor network traffic and system logs for unusual activity or crashes related to ICS components to detect potential exploitation attempts early. 5) Plan and prioritize upgrading affected systems to a supported and patched Windows version, as Windows 10 Version 1809 is an older release with limited support. 6) Implement robust incident response procedures to quickly isolate and remediate affected systems in case of a DoS event. 7) Stay updated with Microsoft security advisories for the release of official patches and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:19.374Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeaaf1

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:22:55 AM

Last updated: 8/7/2025, 9:59:12 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats