Skip to main content

CVE-2024-28902: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-28902cvecve-2024-28902cwe-126
Published: Tue Apr 09 2024 (04/09/2024, 17:00:20 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Remote Access Connection Manager Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 05:29:38 UTC

Technical Analysis

CVE-2024-28902 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0), specifically affecting the Windows Remote Access Connection Manager component. The vulnerability is classified as a CWE-126: Buffer Over-read, which occurs when a program reads data beyond the boundaries of a buffer. This flaw can lead to information disclosure, as the Remote Access Connection Manager may inadvertently expose sensitive memory contents to an attacker. The vulnerability requires local privileges (PR:L) and low attack complexity (AC:L), but no user interaction (UI:N) is needed to exploit it. The attack vector is local (AV:L), meaning the attacker must have local access to the affected system. The scope is unchanged (S:U), indicating the impact is limited to the vulnerable component without affecting other system components. The confidentiality impact is high (C:H), while integrity and availability impacts are none (I:N, A:N). The CVSS v3.1 base score is 5.5, reflecting a medium severity level. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability could allow an attacker with local access and limited privileges to extract sensitive information from memory, potentially leading to further attacks or data leakage. Given that Windows 10 Version 1809 is an older release, many organizations may have already migrated to newer versions, but legacy systems remain at risk. The vulnerability does not require user interaction, increasing the risk if an attacker gains local access, such as through compromised credentials or physical access.

Potential Impact

For European organizations, the primary impact of CVE-2024-28902 lies in potential information disclosure on legacy Windows 10 Version 1809 systems. Confidential data residing in memory could be exposed to unauthorized local users, including sensitive credentials, configuration data, or other protected information. This could facilitate privilege escalation or lateral movement within networks, especially in environments where older Windows 10 versions are still in use due to compatibility or operational constraints. Critical sectors such as finance, healthcare, and government agencies that maintain legacy infrastructure may face increased risk of data breaches or espionage. The vulnerability's local attack vector limits remote exploitation, but insider threats or attackers who have already gained limited access could leverage this flaw to deepen their foothold. The lack of impact on integrity and availability means system operations are unlikely to be disrupted directly, but confidentiality breaches could have regulatory and reputational consequences under GDPR and other data protection frameworks prevalent in Europe.

Mitigation Recommendations

1. Prioritize upgrading or migrating systems from Windows 10 Version 1809 to supported, up-to-date Windows versions where this vulnerability is not present. 2. Implement strict access controls and monitoring on systems running legacy Windows 10 versions to prevent unauthorized local access. 3. Employ endpoint detection and response (EDR) solutions to detect suspicious local activities that could indicate exploitation attempts. 4. Restrict use of Remote Access Connection Manager services where possible, or apply group policies to limit its exposure. 5. Conduct regular audits to identify and inventory devices still running Windows 10 Version 1809 to ensure focused remediation efforts. 6. Until patches are available, consider deploying application whitelisting and privilege management to reduce the risk of local attackers exploiting this vulnerability. 7. Educate staff about the risks of local access compromise and enforce strong physical security controls to prevent unauthorized device access. 8. Monitor official Microsoft channels for patch releases and apply updates promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-13T01:26:53.025Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb282

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 5:29:38 AM

Last updated: 7/26/2025, 8:17:15 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats