Skip to main content

CVE-2024-21365: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-21365cvecve-2024-21365cwe-122
Published: Tue Feb 13 2024 (02/13/2024, 18:02:38 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:09:34 UTC

Technical Analysis

CVE-2024-21365 is a high-severity heap-based buffer overflow vulnerability (CWE-122) affecting Microsoft Windows 10 Version 1809, specifically in the Windows Defender Application Control (WDAC) OLE DB provider for SQL Server. This vulnerability allows remote code execution (RCE) without requiring privileges or authentication, but user interaction is necessary. The flaw arises from improper handling of memory buffers in the OLE DB provider, which can be exploited by an attacker to execute arbitrary code in the context of the affected system. The CVSS v3.1 score of 8.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), with low attack complexity (AC:L), and no privileges required (PR:N), but user interaction (UI:R) is needed, such as convincing a user to open a malicious file or connect to a malicious SQL Server instance. The vulnerability affects Windows 10 Version 1809 (build 10.0.17763.0), a legacy version of Windows 10 that is still in use in some environments. Although no known exploits are currently observed in the wild, the potential for exploitation is significant given the ease of attack and the critical impact. The absence of available patches at the time of publication increases the urgency for mitigation and risk management. This vulnerability could be leveraged by attackers to gain full control over affected systems, steal sensitive data, disrupt operations, or move laterally within networks.

Potential Impact

For European organizations, this vulnerability poses a serious risk, especially for those still operating legacy Windows 10 Version 1809 systems in production environments. The ability to execute remote code without authentication means attackers can potentially compromise endpoints, servers, or SQL Server instances remotely, leading to data breaches, ransomware deployment, or espionage. Critical sectors such as finance, healthcare, manufacturing, and government agencies are particularly vulnerable due to their reliance on Windows infrastructure and SQL Server databases. The confidentiality, integrity, and availability of sensitive data and services could be severely impacted, resulting in operational disruption, financial loss, regulatory penalties under GDPR, and reputational damage. The requirement for user interaction somewhat limits mass exploitation but targeted phishing or social engineering campaigns could facilitate attacks. The lack of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates that once exploits emerge, the threat landscape will escalate rapidly.

Mitigation Recommendations

European organizations should prioritize the following specific actions: 1) Identify and inventory all systems running Windows 10 Version 1809, especially those hosting SQL Server or using the WDAC OLE DB provider. 2) Apply any available Microsoft security updates or patches as soon as they are released; monitor Microsoft security advisories closely. 3) If patching is not immediately possible, implement network-level controls to restrict access to SQL Server instances and limit exposure to untrusted networks. 4) Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior related to OLE DB provider usage. 5) Educate users about the risks of interacting with untrusted content or links that could trigger this vulnerability. 6) Use network segmentation and least privilege principles to minimize the impact of a potential compromise. 7) Monitor logs and network traffic for unusual activity indicative of exploitation attempts. 8) Consider upgrading affected systems to supported Windows versions to reduce exposure to legacy vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:20.448Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeab67

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:09:34 AM

Last updated: 7/31/2025, 9:30:17 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats