CVE-2024-21430: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability
AI Analysis
Technical Summary
CVE-2024-21430 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Windows USB Attached SCSI (UAS) protocol implementation. The vulnerability is classified as CWE-125, which corresponds to an out-of-bounds read error. This type of flaw occurs when the software reads data outside the boundaries of allocated memory buffers, potentially leading to information disclosure or memory corruption. In this case, the vulnerability resides in the handling of USB Attached SCSI protocol data, which is used to communicate with certain USB storage devices. An attacker with physical access to a vulnerable system could exploit this flaw by connecting a specially crafted USB device that uses the UAS protocol. The CVSS v3.1 base score is 5.7, indicating a medium severity level. The vector string (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C) shows that the attack vector is physical (AV:P), requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), with no impact on availability (A:N). The exploitability is proof-of-concept (E:P), and the report confidence is confirmed (RC:C). There are no known exploits in the wild at the time of publication, and no patches are currently linked. The vulnerability could allow an attacker to execute remote code or cause memory corruption by exploiting the out-of-bounds read, potentially leading to system compromise or data leakage. However, the requirement for physical access and high attack complexity limits the ease of exploitation.
Potential Impact
For European organizations, the impact of CVE-2024-21430 depends largely on the deployment of Windows 10 Version 1809 systems that utilize USB Attached SCSI devices. Organizations with legacy systems or specialized hardware relying on UAS protocol USB storage devices are at risk. Successful exploitation could lead to unauthorized disclosure of sensitive information or integrity violations, such as code execution or system manipulation, without requiring user interaction or prior authentication. This could compromise critical systems, particularly in sectors with stringent data protection requirements like finance, healthcare, and government. The physical access requirement reduces the risk of remote exploitation but raises concerns about insider threats or attacks involving physical device insertion, such as targeted espionage or sabotage. Given the medium severity and absence of known exploits, the immediate risk is moderate; however, organizations should remain vigilant, especially those with high-value assets or regulatory obligations under GDPR and other European data protection laws.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Inventory and identify all systems running Windows 10 Version 1809, especially those using USB Attached SCSI devices. 2) Restrict physical access to critical systems to prevent unauthorized USB device insertion, employing physical security controls such as locked ports or USB port blockers. 3) Implement strict device control policies using endpoint security solutions that can whitelist authorized USB devices and block unknown or unauthorized peripherals. 4) Monitor USB device activity and audit logs for unusual or unauthorized device connections. 5) Plan and execute an upgrade or patch deployment strategy to move affected systems to supported Windows versions with security updates, as Windows 10 Version 1809 is an older release with limited support. 6) Educate employees and administrators about the risks of connecting untrusted USB devices and enforce policies prohibiting the use of unknown USB peripherals. These targeted mitigations go beyond generic advice by focusing on physical security, device control, and system lifecycle management specific to this vulnerability's attack vector.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-21430: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Windows USB Attached SCSI (UAS) Protocol Remote Code Execution Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-21430 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Windows USB Attached SCSI (UAS) protocol implementation. The vulnerability is classified as CWE-125, which corresponds to an out-of-bounds read error. This type of flaw occurs when the software reads data outside the boundaries of allocated memory buffers, potentially leading to information disclosure or memory corruption. In this case, the vulnerability resides in the handling of USB Attached SCSI protocol data, which is used to communicate with certain USB storage devices. An attacker with physical access to a vulnerable system could exploit this flaw by connecting a specially crafted USB device that uses the UAS protocol. The CVSS v3.1 base score is 5.7, indicating a medium severity level. The vector string (CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C) shows that the attack vector is physical (AV:P), requires high attack complexity (AC:H), no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality and integrity is high (C:H/I:H), with no impact on availability (A:N). The exploitability is proof-of-concept (E:P), and the report confidence is confirmed (RC:C). There are no known exploits in the wild at the time of publication, and no patches are currently linked. The vulnerability could allow an attacker to execute remote code or cause memory corruption by exploiting the out-of-bounds read, potentially leading to system compromise or data leakage. However, the requirement for physical access and high attack complexity limits the ease of exploitation.
Potential Impact
For European organizations, the impact of CVE-2024-21430 depends largely on the deployment of Windows 10 Version 1809 systems that utilize USB Attached SCSI devices. Organizations with legacy systems or specialized hardware relying on UAS protocol USB storage devices are at risk. Successful exploitation could lead to unauthorized disclosure of sensitive information or integrity violations, such as code execution or system manipulation, without requiring user interaction or prior authentication. This could compromise critical systems, particularly in sectors with stringent data protection requirements like finance, healthcare, and government. The physical access requirement reduces the risk of remote exploitation but raises concerns about insider threats or attacks involving physical device insertion, such as targeted espionage or sabotage. Given the medium severity and absence of known exploits, the immediate risk is moderate; however, organizations should remain vigilant, especially those with high-value assets or regulatory obligations under GDPR and other European data protection laws.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize the following actions: 1) Inventory and identify all systems running Windows 10 Version 1809, especially those using USB Attached SCSI devices. 2) Restrict physical access to critical systems to prevent unauthorized USB device insertion, employing physical security controls such as locked ports or USB port blockers. 3) Implement strict device control policies using endpoint security solutions that can whitelist authorized USB devices and block unknown or unauthorized peripherals. 4) Monitor USB device activity and audit logs for unusual or unauthorized device connections. 5) Plan and execute an upgrade or patch deployment strategy to move affected systems to supported Windows versions with security updates, as Windows 10 Version 1809 is an older release with limited support. 6) Educate employees and administrators about the risks of connecting untrusted USB devices and enforce policies prohibiting the use of unknown USB peripherals. These targeted mitigations go beyond generic advice by focusing on physical security, device control, and system lifecycle management specific to this vulnerability's attack vector.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-12-08T22:45:21.302Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9836c4522896dcbeae1d
Added to database: 5/21/2025, 9:09:10 AM
Last enriched: 6/26/2025, 7:21:21 AM
Last updated: 7/26/2025, 8:11:31 PM
Views: 12
Related Threats
CVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighCVE-2025-40766: CWE-400: Uncontrolled Resource Consumption in Siemens SINEC Traffic Analyzer
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.