CVE-2024-28901: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Windows Remote Access Connection Manager Information Disclosure Vulnerability
AI Analysis
Technical Summary
CVE-2024-28901 is a medium-severity vulnerability identified as a buffer over-read (CWE-126) in the Windows Remote Access Connection Manager component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability allows an attacker with limited privileges (local access with low complexity) to cause an information disclosure by reading memory beyond the intended buffer boundaries. The flaw arises due to improper bounds checking in the Remote Access Connection Manager, which manages VPN and dial-up connections. Exploiting this vulnerability does not require user interaction and can be performed by an authenticated user with local access, potentially exposing sensitive information stored in memory. The vulnerability impacts confidentiality but does not affect integrity or availability. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with an attack vector of local access (AV:L), low attack complexity (AC:L), and requiring privileges (PR:L). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in March 2024 and published in April 2024, indicating recent discovery and disclosure. Given the affected product is Windows 10 Version 1809, which is an older but still in-use version, the vulnerability primarily threatens environments that have not upgraded to newer Windows versions or applied mitigations. The absence of user interaction and the ability to exploit with low complexity increase the risk in scenarios where local access is possible, such as shared workstations or compromised user accounts. The information disclosure could lead to leakage of sensitive data, which may be leveraged for further attacks or privilege escalation.
Potential Impact
For European organizations, the impact of CVE-2024-28901 centers on the potential exposure of sensitive information within systems running Windows 10 Version 1809. Many enterprises, especially in sectors with legacy infrastructure such as manufacturing, healthcare, and public administration, may still operate this Windows version due to compatibility or upgrade constraints. An attacker with local access could exploit this vulnerability to read memory contents, potentially extracting credentials, cryptographic keys, or other confidential data. This could facilitate lateral movement, privilege escalation, or targeted espionage. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach could have significant consequences for compliance with GDPR and other data protection regulations in Europe. Organizations handling sensitive personal or business data may face legal and reputational risks if such information is disclosed. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Remote exploitation is not possible, so the threat is limited to scenarios where an attacker has gained some level of local access, such as through phishing, insider threats, or compromised credentials. The vulnerability is particularly relevant for organizations with shared or multi-user environments, remote access setups, or those that have not yet migrated to supported Windows versions.
Mitigation Recommendations
1. Upgrade: Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and fully patched Windows version (e.g., Windows 10 21H2 or later, Windows 11). This is the most effective mitigation. 2. Access Control: Restrict local access to critical systems by enforcing strict physical and logical access controls, including the use of endpoint security solutions and multi-factor authentication for local logins. 3. Network Segmentation: Limit the exposure of systems running Windows 10 Version 1809 by segmenting networks to reduce the risk of lateral movement by attackers who gain initial access. 4. Monitoring and Detection: Implement enhanced monitoring for unusual local access patterns or privilege escalations, focusing on Remote Access Connection Manager activities and memory access anomalies. 5. Least Privilege: Enforce the principle of least privilege for user accounts to minimize the number of users with local access rights that could exploit this vulnerability. 6. Application Whitelisting: Use application control policies to prevent unauthorized code execution that could facilitate exploitation. 7. Patch Management: Stay alert for official patches or mitigations released by Microsoft and apply them promptly once available. 8. Incident Response Preparedness: Prepare incident response plans that include steps to detect and respond to information disclosure incidents related to this vulnerability. These mitigations go beyond generic advice by focusing on controlling local access vectors and prioritizing upgrade paths, which are critical given the local attack vector and the specific affected Windows version.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2024-28901: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809
Description
Windows Remote Access Connection Manager Information Disclosure Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-28901 is a medium-severity vulnerability identified as a buffer over-read (CWE-126) in the Windows Remote Access Connection Manager component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability allows an attacker with limited privileges (local access with low complexity) to cause an information disclosure by reading memory beyond the intended buffer boundaries. The flaw arises due to improper bounds checking in the Remote Access Connection Manager, which manages VPN and dial-up connections. Exploiting this vulnerability does not require user interaction and can be performed by an authenticated user with local access, potentially exposing sensitive information stored in memory. The vulnerability impacts confidentiality but does not affect integrity or availability. The CVSS v3.1 base score is 5.5, reflecting a medium severity level, with an attack vector of local access (AV:L), low attack complexity (AC:L), and requiring privileges (PR:L). No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability was reserved in March 2024 and published in April 2024, indicating recent discovery and disclosure. Given the affected product is Windows 10 Version 1809, which is an older but still in-use version, the vulnerability primarily threatens environments that have not upgraded to newer Windows versions or applied mitigations. The absence of user interaction and the ability to exploit with low complexity increase the risk in scenarios where local access is possible, such as shared workstations or compromised user accounts. The information disclosure could lead to leakage of sensitive data, which may be leveraged for further attacks or privilege escalation.
Potential Impact
For European organizations, the impact of CVE-2024-28901 centers on the potential exposure of sensitive information within systems running Windows 10 Version 1809. Many enterprises, especially in sectors with legacy infrastructure such as manufacturing, healthcare, and public administration, may still operate this Windows version due to compatibility or upgrade constraints. An attacker with local access could exploit this vulnerability to read memory contents, potentially extracting credentials, cryptographic keys, or other confidential data. This could facilitate lateral movement, privilege escalation, or targeted espionage. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach could have significant consequences for compliance with GDPR and other data protection regulations in Europe. Organizations handling sensitive personal or business data may face legal and reputational risks if such information is disclosed. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. Remote exploitation is not possible, so the threat is limited to scenarios where an attacker has gained some level of local access, such as through phishing, insider threats, or compromised credentials. The vulnerability is particularly relevant for organizations with shared or multi-user environments, remote access setups, or those that have not yet migrated to supported Windows versions.
Mitigation Recommendations
1. Upgrade: Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and fully patched Windows version (e.g., Windows 10 21H2 or later, Windows 11). This is the most effective mitigation. 2. Access Control: Restrict local access to critical systems by enforcing strict physical and logical access controls, including the use of endpoint security solutions and multi-factor authentication for local logins. 3. Network Segmentation: Limit the exposure of systems running Windows 10 Version 1809 by segmenting networks to reduce the risk of lateral movement by attackers who gain initial access. 4. Monitoring and Detection: Implement enhanced monitoring for unusual local access patterns or privilege escalations, focusing on Remote Access Connection Manager activities and memory access anomalies. 5. Least Privilege: Enforce the principle of least privilege for user accounts to minimize the number of users with local access rights that could exploit this vulnerability. 6. Application Whitelisting: Use application control policies to prevent unauthorized code execution that could facilitate exploitation. 7. Patch Management: Stay alert for official patches or mitigations released by Microsoft and apply them promptly once available. 8. Incident Response Preparedness: Prepare incident response plans that include steps to detect and respond to information disclosure incidents related to this vulnerability. These mitigations go beyond generic advice by focusing on controlling local access vectors and prioritizing upgrade paths, which are critical given the local attack vector and the specific affected Windows version.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-03-13T01:26:53.025Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb27e
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 5:41:57 AM
Last updated: 8/11/2025, 6:38:13 PM
Views: 11
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.