Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28899: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-28899cvecve-2024-28899cwe-121
Published: Tue Jul 09 2024 (07/09/2024, 17:02:08 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

CVE-2024-28899 is a high-severity stack-based buffer overflow vulnerability affecting Microsoft Windows 10 Version 1809 (build 10. 0. 17763. 0). It allows an attacker to bypass the Secure Boot security feature without requiring privileges or user interaction. Exploitation can lead to full compromise of confidentiality, integrity, and availability of the affected system. Although no known exploits are currently in the wild, the vulnerability poses a significant risk due to its potential impact and ease of exploitation over a network. European organizations running this Windows version are at risk, especially those in critical infrastructure and government sectors. Mitigation requires applying patches once available, restricting network access to vulnerable systems, and employing advanced endpoint protection. Countries with high Windows 10 1809 usage and strategic targets, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/17/2025, 00:33:07 UTC

Technical Analysis

CVE-2024-28899 is a stack-based buffer overflow vulnerability categorized under CWE-121, discovered in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability specifically impacts the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system boot process. By exploiting this buffer overflow, an unauthenticated attacker can bypass Secure Boot protections, potentially allowing the execution of malicious code at a privileged level early in the boot sequence. The vulnerability does not require any privileges or user interaction, making it remotely exploitable under certain conditions, as indicated by the CVSS vector (Attack Vector: Adjacent Network). The flaw arises from improper handling of input data leading to a stack overflow, which can corrupt memory and enable arbitrary code execution. The impact includes complete compromise of system confidentiality, integrity, and availability, as attackers could disable security controls, install persistent malware, or cause system crashes. Although no public exploits have been reported yet, the vulnerability's characteristics and high CVSS score (8.8) suggest it is a critical risk for affected systems. The lack of available patches at the time of reporting increases the urgency for organizations to implement interim mitigations and monitor for updates from Microsoft.

Potential Impact

For European organizations, the impact of CVE-2024-28899 is significant due to the widespread use of Windows 10 Version 1809 in enterprise environments. Successful exploitation could lead to unauthorized code execution with system-level privileges, allowing attackers to bypass Secure Boot protections that are foundational for system integrity. This could result in persistent malware infections, data breaches, disruption of critical services, and loss of trust in IT infrastructure. Sectors such as government, finance, healthcare, and critical infrastructure are particularly at risk, as attackers could leverage this vulnerability to gain footholds for espionage, sabotage, or ransomware deployment. The vulnerability's network-adjacent attack vector means that attackers within the same network segment or with limited network access could exploit it, increasing the threat in shared or poorly segmented environments. The absence of known exploits currently provides a window for proactive defense, but the high severity demands immediate attention to prevent potential future attacks.

Mitigation Recommendations

1. Apply security patches from Microsoft immediately once they become available to address CVE-2024-28899. 2. Until patches are released, restrict network access to systems running Windows 10 Version 1809, especially limiting access to trusted administrators and critical services. 3. Implement network segmentation to isolate vulnerable systems and reduce the attack surface. 4. Employ advanced endpoint detection and response (EDR) solutions capable of detecting anomalous behavior indicative of exploitation attempts. 5. Monitor system logs and network traffic for unusual activity related to Secure Boot processes or unexpected memory corruption events. 6. Disable or restrict use of legacy or unnecessary boot options that could be leveraged during exploitation. 7. Conduct regular vulnerability assessments and penetration testing focused on Secure Boot and boot process security. 8. Educate IT staff about the risks and signs of exploitation related to this vulnerability to enhance incident response readiness.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-13T01:26:53.024Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb578

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 12/17/2025, 12:33:07 AM

Last updated: 1/19/2026, 10:07:40 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats