CVE-2024-28900: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Windows Remote Access Connection Manager Information Disclosure Vulnerability
AI Analysis
Technical Summary
CVE-2024-28900 is a medium-severity vulnerability identified as a buffer over-read (CWE-126) in the Windows Remote Access Connection Manager component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability allows an attacker with limited privileges (local access with low privileges) to cause the system to read beyond the intended buffer boundaries during the processing of remote access connection data. The flaw does not require user interaction and can be exploited locally with low complexity, but it does require some level of privilege (PR:L). The vulnerability impacts confidentiality by potentially allowing an attacker to access sensitive information from memory that should not be exposed, but it does not affect integrity or availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity level. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability is specific to Windows 10 Version 1809, which is an older version of Windows 10, meaning that systems running this version remain at risk if unpatched. The Remote Access Connection Manager is responsible for managing dial-up and VPN connections, so the vulnerability could be leveraged in environments where such connections are used, potentially exposing sensitive connection information or credentials stored in memory buffers. Given the nature of the vulnerability, exploitation would likely require local access to the system, limiting remote exploitation scenarios but still posing a risk in environments with shared or multi-user access or where attackers have gained limited footholds.
Potential Impact
For European organizations, the impact of CVE-2024-28900 centers on potential information disclosure within systems running Windows 10 Version 1809. Many enterprises, especially those with legacy systems or specialized industrial environments, may still operate this version, exposing them to confidentiality breaches. The vulnerability could allow attackers with local access to extract sensitive data from memory buffers related to remote access connections, such as VPN credentials or configuration details, which could facilitate further lateral movement or privilege escalation within corporate networks. This is particularly concerning for sectors with high reliance on VPNs and remote access, such as finance, government, healthcare, and critical infrastructure. While the vulnerability does not directly impact system integrity or availability, the confidentiality breach could lead to significant secondary impacts, including data leaks, compliance violations (e.g., GDPR), and reputational damage. The requirement for local privileges reduces the risk of widespread remote exploitation but does not eliminate the threat in environments where attackers may gain initial access through other means. Additionally, the lack of a patch at the time of disclosure increases the window of exposure. Organizations with remote or hybrid workforces that rely on VPN connections are especially at risk, as attackers could exploit this vulnerability to harvest credentials or session information.
Mitigation Recommendations
To mitigate CVE-2024-28900, European organizations should: 1) Identify and inventory all systems running Windows 10 Version 1809, prioritizing those with Remote Access Connection Manager enabled or in use. 2) Restrict local access rights rigorously, ensuring that only trusted users have the ability to log into affected systems, and implement strict access controls and monitoring for local logins. 3) Employ endpoint detection and response (EDR) solutions to detect anomalous local activity that could indicate exploitation attempts. 4) Where possible, upgrade affected systems to a more recent, supported version of Windows 10 or Windows 11 that is not vulnerable to this issue, as this is the most effective long-term mitigation. 5) Apply network segmentation to isolate legacy systems and limit lateral movement opportunities. 6) Monitor VPN and remote access logs for unusual activity that could indicate attempts to exploit this vulnerability. 7) Until an official patch is released, consider disabling or limiting the use of Remote Access Connection Manager services on vulnerable systems if operationally feasible. 8) Educate users about the risks of local privilege escalation and enforce strong endpoint security policies to prevent initial compromise that could lead to local access.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2024-28900: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Description
Windows Remote Access Connection Manager Information Disclosure Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-28900 is a medium-severity vulnerability identified as a buffer over-read (CWE-126) in the Windows Remote Access Connection Manager component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability allows an attacker with limited privileges (local access with low privileges) to cause the system to read beyond the intended buffer boundaries during the processing of remote access connection data. The flaw does not require user interaction and can be exploited locally with low complexity, but it does require some level of privilege (PR:L). The vulnerability impacts confidentiality by potentially allowing an attacker to access sensitive information from memory that should not be exposed, but it does not affect integrity or availability. The CVSS 3.1 base score is 5.5, reflecting a medium severity level. There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability is specific to Windows 10 Version 1809, which is an older version of Windows 10, meaning that systems running this version remain at risk if unpatched. The Remote Access Connection Manager is responsible for managing dial-up and VPN connections, so the vulnerability could be leveraged in environments where such connections are used, potentially exposing sensitive connection information or credentials stored in memory buffers. Given the nature of the vulnerability, exploitation would likely require local access to the system, limiting remote exploitation scenarios but still posing a risk in environments with shared or multi-user access or where attackers have gained limited footholds.
Potential Impact
For European organizations, the impact of CVE-2024-28900 centers on potential information disclosure within systems running Windows 10 Version 1809. Many enterprises, especially those with legacy systems or specialized industrial environments, may still operate this version, exposing them to confidentiality breaches. The vulnerability could allow attackers with local access to extract sensitive data from memory buffers related to remote access connections, such as VPN credentials or configuration details, which could facilitate further lateral movement or privilege escalation within corporate networks. This is particularly concerning for sectors with high reliance on VPNs and remote access, such as finance, government, healthcare, and critical infrastructure. While the vulnerability does not directly impact system integrity or availability, the confidentiality breach could lead to significant secondary impacts, including data leaks, compliance violations (e.g., GDPR), and reputational damage. The requirement for local privileges reduces the risk of widespread remote exploitation but does not eliminate the threat in environments where attackers may gain initial access through other means. Additionally, the lack of a patch at the time of disclosure increases the window of exposure. Organizations with remote or hybrid workforces that rely on VPN connections are especially at risk, as attackers could exploit this vulnerability to harvest credentials or session information.
Mitigation Recommendations
To mitigate CVE-2024-28900, European organizations should: 1) Identify and inventory all systems running Windows 10 Version 1809, prioritizing those with Remote Access Connection Manager enabled or in use. 2) Restrict local access rights rigorously, ensuring that only trusted users have the ability to log into affected systems, and implement strict access controls and monitoring for local logins. 3) Employ endpoint detection and response (EDR) solutions to detect anomalous local activity that could indicate exploitation attempts. 4) Where possible, upgrade affected systems to a more recent, supported version of Windows 10 or Windows 11 that is not vulnerable to this issue, as this is the most effective long-term mitigation. 5) Apply network segmentation to isolate legacy systems and limit lateral movement opportunities. 6) Monitor VPN and remote access logs for unusual activity that could indicate attempts to exploit this vulnerability. 7) Until an official patch is released, consider disabling or limiting the use of Remote Access Connection Manager services on vulnerable systems if operationally feasible. 8) Educate users about the risks of local privilege escalation and enforce strong endpoint security policies to prevent initial compromise that could lead to local access.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-03-13T01:26:53.025Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9836c4522896dcbeb27c
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 5:42:13 AM
Last updated: 8/8/2025, 11:13:54 PM
Views: 10
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.