Skip to main content

CVE-2024-26252: CWE-822: Untrusted Pointer Dereference in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-26252cvecve-2024-26252cwe-822
Published: Tue Apr 09 2024 (04/09/2024, 17:00:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows rndismp6.sys Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 05:45:39 UTC

Technical Analysis

CVE-2024-26252 is a vulnerability identified in the Microsoft Windows 10 operating system, specifically version 1809 (build 10.0.17763.0). The flaw resides in the rndismp6.sys driver, which is related to the Remote Network Driver Interface Specification (RNDIS) protocol implementation. The vulnerability is classified under CWE-822, indicating an untrusted pointer dereference issue. This type of flaw occurs when the system dereferences a pointer that can be controlled or influenced by an attacker, potentially leading to memory corruption. In this case, the vulnerability allows for remote code execution (RCE), meaning an attacker can execute arbitrary code on the affected system without requiring any prior authentication or user interaction. The CVSS v3.1 base score is 6.8, categorized as medium severity, with the vector string indicating that the attack vector is physical (AV:P), attack complexity is low (AC:L), no privileges are required (PR:N), and no user interaction is needed (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability was published on April 9, 2024, and as of now, no known exploits have been observed in the wild. The lack of patch links suggests that a fix may not yet be publicly available or is pending release from Microsoft. The vulnerability's exploitation requires physical proximity or access to the device's network interface supporting RNDIS, which is commonly used for USB tethering and network communication over USB connections. Exploiting this vulnerability could allow an attacker to execute code remotely on the device, potentially leading to full system compromise, data theft, or disruption of system availability.

Potential Impact

For European organizations, the impact of CVE-2024-26252 can be significant, especially for those relying on Windows 10 Version 1809 in environments where devices are physically accessible or where USB tethering and RNDIS interfaces are used extensively. The vulnerability's ability to allow remote code execution without user interaction or privileges means that attackers could compromise systems silently and gain full control. This poses risks to confidentiality, as sensitive data could be exfiltrated; integrity, as system files or configurations could be altered; and availability, as systems could be disrupted or rendered inoperable. Critical infrastructure, government agencies, and enterprises with high-security requirements are particularly at risk if devices running this Windows version are deployed in operational environments. Additionally, since Windows 10 Version 1809 is an older release, it may still be in use in legacy systems or industrial control systems within Europe, increasing the attack surface. The absence of known exploits in the wild currently reduces immediate risk, but the medium severity score and potential impact warrant proactive mitigation to prevent future exploitation.

Mitigation Recommendations

1. Immediate identification and inventory of all systems running Windows 10 Version 1809 within the organization to assess exposure. 2. Restrict physical access to devices, especially those with USB ports that could be used to exploit RNDIS vulnerabilities, through enhanced physical security controls and endpoint protection policies. 3. Disable or restrict the use of RNDIS interfaces and USB tethering on critical systems where not required, using group policies or device management tools. 4. Monitor network traffic and device logs for unusual activity related to USB network interfaces or unexpected remote code execution attempts. 5. Apply any available Microsoft security updates or patches as soon as they are released; if patches are not yet available, consider upgrading affected systems to a supported and patched version of Windows 10 or Windows 11. 6. Implement endpoint detection and response (EDR) solutions capable of detecting suspicious behavior related to driver exploitation or memory corruption. 7. Educate IT staff and users about the risks of connecting unknown USB devices or using USB tethering in unsecured environments. 8. For high-security environments, consider network segmentation to isolate legacy systems running Windows 10 Version 1809 from critical infrastructure and sensitive data repositories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-02-15T00:57:49.362Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9836c4522896dcbeb210

Added to database: 5/21/2025, 9:09:10 AM

Last enriched: 6/26/2025, 5:45:39 AM

Last updated: 8/13/2025, 9:11:12 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats