Skip to main content

CVE-2024-21406: CWE-319: Cleartext Transmission of Sensitive Information in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-21406cvecve-2024-21406cwe-319
Published: Tue Feb 13 2024 (02/13/2024, 18:02:47 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Printing Service Spoofing Vulnerability

AI-Powered Analysis

AILast updated: 07/05/2025, 06:24:53 UTC

Technical Analysis

CVE-2024-21406 is a high-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is categorized under CWE-319, which involves the cleartext transmission of sensitive information. Specifically, this vulnerability relates to the Windows Printing Service, where sensitive data is transmitted without encryption, making it susceptible to interception and spoofing attacks. An attacker with network access could exploit this flaw by intercepting or manipulating print service communications, potentially injecting malicious data or commands. The CVSS v3.1 base score of 7.5 reflects a network attack vector with low attack complexity, no privileges or user interaction required, and a significant impact on integrity, though confidentiality and availability impacts are not indicated. The vulnerability does not require authentication or user interaction, increasing its risk profile. Despite the absence of known exploits in the wild at the time of publication, the nature of the vulnerability suggests that attackers could leverage it to alter print jobs or disrupt printing workflows, potentially leading to misinformation, operational disruption, or lateral movement within a network.

Potential Impact

For European organizations, this vulnerability poses a tangible risk to operational integrity, especially in sectors heavily reliant on printing services for sensitive documents, such as government, finance, healthcare, and legal industries. The ability to spoof or manipulate print jobs could lead to unauthorized disclosure of sensitive information or the introduction of falsified documents, undermining trust and compliance with data protection regulations like GDPR. Additionally, disruption of printing services could affect business continuity. Since the vulnerability allows exploitation over the network without authentication, attackers could target internal networks or exploit exposed print services remotely if improperly secured. This elevates the risk for organizations with remote or hybrid work environments where network segmentation or endpoint protections may be inconsistent.

Mitigation Recommendations

Organizations should prioritize upgrading or patching affected Windows 10 Version 1809 systems to the latest supported versions where this vulnerability is resolved, as no direct patch links are provided in the source data. In the interim, network-level mitigations include restricting access to print services via firewall rules and network segmentation to limit exposure to trusted devices only. Employing encrypted communication channels such as IPsec or VPNs for print traffic can mitigate cleartext transmission risks. Monitoring network traffic for anomalous print service activity and implementing strict access controls on print servers are also recommended. Additionally, organizations should audit and update printer driver software and firmware to the latest versions and consider disabling legacy or unnecessary print protocols that may be vulnerable. User awareness and incident response plans should incorporate scenarios involving print service manipulation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2023-12-08T22:45:21.299Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd848e

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 6:24:53 AM

Last updated: 7/28/2025, 9:38:33 PM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats