Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28899: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-28899cvecve-2024-28899cwe-121
Published: Tue Jul 09 2024 (07/09/2024, 17:02:08 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:24:16 UTC

Technical Analysis

CVE-2024-28899 is a stack-based buffer overflow vulnerability classified under CWE-121, impacting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system startup process. Exploitation of this vulnerability allows an attacker to bypass Secure Boot protections, potentially enabling execution of arbitrary code at a privileged level. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with an attack vector of 'Adjacent Network' (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker can remotely exploit the vulnerability without authentication or user interaction, leading to full system compromise. Although no public exploits are currently known, the vulnerability's nature and impact make it a critical concern for affected systems. The vulnerability was reserved in March 2024 and published in July 2024, with no patches currently linked, indicating that organizations must monitor for updates and apply them promptly once available. The vulnerability's presence in a legacy Windows 10 version means that many enterprise environments that have not upgraded remain exposed. The Secure Boot bypass can facilitate persistent malware installation and undermine system trustworthiness, posing a significant risk to enterprise security.

Potential Impact

For European organizations, the impact of CVE-2024-28899 is substantial. Organizations running Windows 10 Version 1809, particularly in sectors such as government, finance, healthcare, and critical infrastructure, face risks of unauthorized code execution, data breaches, and system downtime. The Secure Boot bypass undermines the foundational security of system integrity, enabling attackers to install persistent malware or rootkits that evade detection and remediation. This can lead to loss of sensitive data, disruption of services, and potential regulatory non-compliance under GDPR due to compromised confidentiality and integrity. The remote exploitability without authentication or user interaction increases the likelihood of widespread attacks, especially in networked environments. Legacy systems that have not been updated or replaced are particularly vulnerable, and the lack of immediate patches elevates the risk window. The threat also complicates incident response and recovery efforts, as compromised Secure Boot can hinder forensic analysis and system restoration.

Mitigation Recommendations

1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version to eliminate exposure. 2. Monitor Microsoft security advisories closely and apply patches immediately once released. 3. Implement network segmentation and restrict access to vulnerable systems, especially from untrusted or adjacent networks, to reduce attack surface. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions capable of detecting anomalous behaviors indicative of Secure Boot bypass attempts. 5. Conduct regular integrity checks of boot components and firmware to detect unauthorized modifications. 6. Harden system configurations by disabling legacy or unnecessary services that could facilitate exploitation. 7. Maintain comprehensive backups and incident response plans to enable rapid recovery in case of compromise. 8. Educate IT staff on the risks associated with legacy Windows versions and the importance of timely patch management. 9. Use threat intelligence feeds to stay informed about emerging exploits targeting this vulnerability. 10. Consider deploying hardware-based security features, such as TPM and measured boot, to complement Secure Boot protections.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-13T01:26:53.024Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb578

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 2/11/2026, 10:24:16 AM

Last updated: 3/26/2026, 1:08:02 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses