Skip to main content

CVE-2024-28899: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-28899cvecve-2024-28899cwe-121
Published: Tue Jul 09 2024 (07/09/2024, 17:02:08 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 07/05/2025, 20:11:22 UTC

Technical Analysis

CVE-2024-28899 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability specifically targets the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system startup process. The flaw allows an attacker to bypass Secure Boot protections by exploiting a buffer overflow condition on the stack, potentially enabling arbitrary code execution with elevated privileges. The vulnerability has a CVSS v3.1 base score of 8.8, indicating a high impact on confidentiality, integrity, and availability. The attack vector is adjacent network (AV:A), requiring no privileges (PR:N) and no user interaction (UI:N), which increases the risk of exploitation in networked environments. Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a critical concern for affected systems. The absence of published patches at the time of this report further elevates the urgency for mitigation. Exploitation could allow attackers to compromise the boot process, potentially installing persistent malware or rootkits that evade detection and undermine system trustworthiness.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and government agencies relying on Windows 10 Version 1809 in their infrastructure. Compromise of Secure Boot can lead to persistent, stealthy malware infections that are difficult to detect and remove, threatening sensitive data confidentiality and system integrity. Critical sectors such as finance, healthcare, and public administration could face operational disruptions and data breaches. The vulnerability's ability to be exploited remotely without user interaction increases the attack surface, particularly in environments with remote access or network adjacency. Given the widespread use of Windows 10 in Europe and the importance of Secure Boot in securing endpoint devices, exploitation could facilitate advanced persistent threats (APTs) and supply chain attacks, undermining trust in IT systems and potentially causing regulatory compliance issues under GDPR and other data protection laws.

Mitigation Recommendations

Organizations should prioritize upgrading affected systems to a supported Windows version where this vulnerability is patched. In the absence of an official patch, mitigation strategies include disabling network protocols or services that allow adjacent network access to vulnerable systems, thereby reducing the attack surface. Implementing strict network segmentation and access controls can limit exposure. Enforcing hardware-based security features such as TPM (Trusted Platform Module) and ensuring Secure Boot is enabled and properly configured may help detect or prevent exploitation attempts. Regular integrity checks of boot components and monitoring for unusual system behavior indicative of boot-level compromise are recommended. Additionally, organizations should maintain up-to-date backups and have incident response plans ready to address potential exploitation. Close monitoring of vendor advisories for patch releases and applying them promptly is critical.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-13T01:26:53.024Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb578

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/5/2025, 8:11:22 PM

Last updated: 7/26/2025, 2:57:22 AM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats