Skip to main content

CVE-2024-21370: CWE-122: Heap-based Buffer Overflow in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-21370cvecve-2024-21370cwe-122
Published: Tue Feb 13 2024 (02/13/2024, 18:02:40 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:08:22 UTC

Technical Analysis

CVE-2024-21370 is a high-severity heap-based buffer overflow vulnerability (CWE-122) affecting Microsoft Windows 10 Version 1809, specifically version 10.0.17763.0. The vulnerability resides in the Windows Defender Application Control (WDAC) OLE DB provider for SQL Server. This component is responsible for enabling database connectivity and operations via OLE DB interfaces. The heap-based buffer overflow flaw can be triggered remotely without requiring privileges, but it does require user interaction. Exploiting this vulnerability could allow an attacker to execute arbitrary code remotely on the affected system. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, no privileges required, but user interaction needed. The vulnerability allows an attacker to potentially gain full control over the targeted system, leading to data compromise, system manipulation, or denial of service. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make it a critical issue to address, especially on legacy Windows 10 systems still in use. No official patches or mitigation links are provided yet, indicating that organizations must monitor for updates and consider interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for those still running Windows 10 Version 1809 in production environments. The ability for remote code execution without privileges means attackers could compromise systems through crafted database queries or interactions with the WDAC OLE DB provider, potentially leading to unauthorized data access, disruption of business-critical applications, and lateral movement within networks. Industries such as finance, healthcare, manufacturing, and government agencies that rely on legacy Windows 10 systems and SQL Server connectivity are especially vulnerable. The impact extends to confidentiality breaches, integrity violations through unauthorized code execution, and availability loss due to system crashes or ransomware deployment. Given the high connectivity and regulatory requirements in Europe (e.g., GDPR), exploitation could also result in significant compliance and reputational damage.

Mitigation Recommendations

Organizations should prioritize upgrading or patching affected Windows 10 Version 1809 systems as soon as Microsoft releases an official security update. In the interim, practical mitigations include disabling or restricting the use of the WDAC OLE DB provider where possible, especially on systems exposed to untrusted networks. Network segmentation and strict firewall rules should limit access to SQL Server instances and related services to trusted users and systems only. Employing application whitelisting and endpoint detection and response (EDR) solutions can help detect anomalous behavior indicative of exploitation attempts. Additionally, enforcing multi-factor authentication and minimizing user interaction with untrusted content can reduce the risk of triggering the vulnerability. Regularly monitoring security advisories and threat intelligence feeds for exploit developments is critical to timely response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:20.449Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeab6f

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:08:22 AM

Last updated: 7/29/2025, 3:41:21 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats