Skip to main content

CVE-2024-26174: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-26174cvecve-2024-26174cwe-125
Published: Tue Mar 12 2024 (03/12/2024, 16:58:10 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kernel Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 06:45:14 UTC

Technical Analysis

CVE-2024-26174 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is classified as an out-of-bounds read (CWE-125) within the Windows kernel, which can lead to information disclosure. Specifically, this vulnerability allows a local attacker with low privileges (PR:L) to read memory outside the intended bounds of a kernel data structure or buffer. The attack vector requires local access (AV:L) and no user interaction (UI:N), but the attacker must have some level of privileges on the system. The vulnerability does not affect system integrity or availability but can expose sensitive kernel memory contents, potentially leaking confidential information such as kernel data structures, pointers, or other sensitive information that could aid in further exploitation or privilege escalation. The CVSS 3.1 base score is 5.5, reflecting a medium severity due to the limited attack vector and the requirement for local privileges, but with a high impact on confidentiality (C:H). No known exploits are currently reported in the wild, and no patches or mitigation links have been published yet. The vulnerability was reserved in February 2024 and published in March 2024, indicating it is a recent discovery. Since it affects Windows 10 Version 1809, which is an older but still in-use version of Windows 10, systems running this version remain at risk until patched or mitigated. The vulnerability's nature as an information disclosure flaw in the kernel can be leveraged as a stepping stone for more severe attacks, such as privilege escalation or bypassing security controls, if combined with other vulnerabilities or attack techniques.

Potential Impact

For European organizations, the impact of CVE-2024-26174 primarily lies in the potential exposure of sensitive kernel memory information on systems running Windows 10 Version 1809. This could lead to leakage of confidential data, including security tokens, kernel pointers, or other sensitive information that attackers could use to facilitate further attacks such as privilege escalation or evasion of security mechanisms. Organizations in sectors with high security requirements—such as finance, government, critical infrastructure, and healthcare—may face increased risk if attackers leverage this vulnerability to gain deeper system access. Although the vulnerability does not directly compromise system integrity or availability, the confidentiality breach could undermine trust in system security and lead to compliance issues under regulations like GDPR if sensitive personal or organizational data is indirectly exposed. The requirement for local access and privileges limits the scope of exploitation to insiders or attackers who have already compromised a user account, but the vulnerability could be exploited in multi-user environments or through social engineering to escalate privileges. Given that Windows 10 Version 1809 is still in use in some enterprises, especially those with legacy systems or delayed upgrade cycles, the vulnerability represents a tangible risk until mitigated.

Mitigation Recommendations

1. Upgrade or patch: Organizations should prioritize upgrading systems from Windows 10 Version 1809 to a more recent, supported Windows version where this vulnerability is fixed. If patches become available from Microsoft, they should be applied promptly. 2. Privilege management: Restrict local user privileges to the minimum necessary to reduce the pool of users who can exploit this vulnerability. 3. System hardening: Employ kernel-mode exploit mitigations such as Kernel Patch Protection (PatchGuard), Driver Signature Enforcement, and enable virtualization-based security features where supported to reduce the risk of kernel memory disclosure. 4. Monitoring and detection: Implement monitoring for unusual local privilege escalation attempts or anomalous kernel memory access patterns using endpoint detection and response (EDR) tools. 5. Network segmentation: Limit access to systems running Windows 10 Version 1809 to trusted users and networks to reduce the likelihood of local attackers gaining access. 6. User awareness: Educate users about the risks of privilege misuse and the importance of reporting suspicious activity, as exploitation requires local privileges. 7. Application whitelisting: Use application control policies to prevent unauthorized code execution that could leverage this vulnerability. These measures go beyond generic advice by focusing on reducing the local attack surface, enforcing strict privilege controls, and enhancing detection capabilities specific to kernel-level information disclosure threats.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-02-14T22:23:54.097Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeaf72

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 6:45:14 AM

Last updated: 7/29/2025, 12:48:57 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats