Skip to main content

CVE-2024-21372: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-21372cvecve-2024-21372cwe-190
Published: Tue Feb 13 2024 (02/13/2024, 18:02:17 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows OLE Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 08:08:09 UTC

Technical Analysis

CVE-2024-21372 is a high-severity integer overflow or wraparound vulnerability (CWE-190) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability resides within the Object Linking and Embedding (OLE) component of Windows, which is responsible for enabling inter-process communication and embedding documents or objects across different applications. An integer overflow occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, potentially causing unexpected behavior such as memory corruption. In this case, the overflow can be exploited remotely without requiring privileges or authentication, but it does require user interaction (UI:R). Successful exploitation could allow an attacker to execute arbitrary code remotely with high impact on confidentiality, integrity, and availability of the affected system. The CVSS 3.1 base score is 8.8, reflecting the ease of exploitation over the network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is necessary (UI:R). The vulnerability is unpatched as of the published date (February 13, 2024), and no known exploits are currently observed in the wild. However, given the criticality of OLE and the potential for remote code execution, this vulnerability represents a significant risk to affected systems. The lack of available patches increases the urgency for mitigation and monitoring. The vulnerability was reserved in December 2023 and published in February 2024, indicating recent discovery and disclosure. The vulnerability affects a legacy Windows 10 version (1809), which is still in use in some environments but is no longer the latest supported version, potentially complicating patch management and mitigation efforts.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those still running Windows 10 Version 1809 in production environments. The ability for remote code execution without privileges means attackers can potentially compromise systems through crafted OLE objects delivered via email attachments, malicious documents, or network vectors that trigger OLE processing. This could lead to data breaches, ransomware deployment, or disruption of critical services. Confidentiality is at high risk as attackers could exfiltrate sensitive data; integrity could be compromised by unauthorized code execution; and availability could be affected through system crashes or malware payloads. Sectors such as finance, healthcare, government, and critical infrastructure in Europe are particularly vulnerable due to their reliance on legacy Windows systems and the high value of their data. The requirement for user interaction means phishing or social engineering remain likely attack vectors. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates that once exploits emerge, rapid exploitation could occur. Organizations with strict compliance requirements under GDPR and other regulations must prioritize addressing this vulnerability to avoid legal and reputational consequences.

Mitigation Recommendations

Given the absence of official patches at the time of disclosure, European organizations should implement immediate compensating controls. These include disabling or restricting OLE functionality where feasible, especially in email clients and document processing applications, to reduce the attack surface. Employ advanced email filtering and attachment sandboxing to detect and block malicious documents exploiting OLE. Enforce strict user awareness training to mitigate risks from phishing and social engineering that could trigger user interaction. Network segmentation and application whitelisting can limit lateral movement if exploitation occurs. Monitor network and endpoint logs for unusual OLE-related activity or crashes indicative of exploitation attempts. Organizations should plan to upgrade affected systems to a supported Windows version with available security updates, as Windows 10 Version 1809 is legacy and may not receive timely patches. Additionally, deploy endpoint detection and response (EDR) solutions capable of detecting exploitation behaviors related to integer overflow or memory corruption. Maintain up-to-date backups and incident response plans to minimize impact in case of successful exploitation. Finally, keep abreast of Microsoft advisories for forthcoming patches and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:20.450Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeab73

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 8:08:09 AM

Last updated: 8/17/2025, 5:02:04 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats