Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-28925: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-28925cvecve-2024-28925cwe-121
Published: Tue Apr 09 2024 (04/09/2024, 17:01:08 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 04:59:52 UTC

Technical Analysis

CVE-2024-28925 is a high-severity stack-based buffer overflow vulnerability (CWE-121) affecting Microsoft Windows 10 Version 1809, specifically build 10.0.17763.0. This vulnerability relates to a Secure Boot security feature bypass, which is critical because Secure Boot is designed to ensure that only trusted software is loaded during the system startup process, protecting against rootkits and boot-level malware. The vulnerability allows an attacker to exploit a stack-based buffer overflow, potentially enabling arbitrary code execution with high impact on confidentiality, integrity, and availability. The CVSS 3.1 score of 8.0 reflects the vulnerability's high impact, with an attack vector classified as adjacent network (AV:A), requiring no privileges (PR:N), but user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature and impact make it a significant risk. The absence of a patch link suggests that a fix may not yet be publicly available, increasing the urgency for mitigation. The vulnerability could allow attackers to bypass Secure Boot protections, potentially enabling persistent, stealthy malware infections at the boot level, which are difficult to detect and remediate.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for critical infrastructure, government agencies, financial institutions, and enterprises relying on Windows 10 Version 1809 systems. Exploitation could lead to unauthorized code execution at a very early stage of system boot, undermining system integrity and allowing attackers to maintain persistence and evade detection. The high impact on confidentiality, integrity, and availability means sensitive data could be exfiltrated, systems could be manipulated or destroyed, and operational disruptions could occur. Given that many organizations in Europe still operate legacy Windows 10 systems due to compatibility or regulatory reasons, the threat surface is significant. The requirement for user interaction limits remote exploitation but does not eliminate risk, as phishing or social engineering could trigger the vulnerability. The lack of known exploits in the wild currently provides a window for proactive defense, but the potential for future exploitation remains high. Organizations in sectors with stringent security requirements, such as finance, healthcare, and government, are particularly vulnerable due to the criticality of their systems and data.

Mitigation Recommendations

Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported, patched version of Windows 10 or Windows 11 where this vulnerability is resolved. Implement strict application whitelisting and endpoint detection and response (EDR) solutions to monitor for unusual behavior indicative of exploitation attempts, especially around boot processes. Educate users on the risks of social engineering and phishing attacks that could trigger user interaction required for exploitation. Isolate legacy systems running Windows 10 Version 1809 from sensitive networks and limit their network exposure to reduce the attack surface. Deploy network segmentation to contain potential breaches and prevent lateral movement if exploitation occurs. Regularly audit and monitor Secure Boot configurations to ensure they have not been tampered with and maintain firmware integrity checks. Prepare incident response plans specifically addressing boot-level compromise scenarios to enable rapid detection and remediation. Engage with Microsoft support channels to obtain any available patches or workarounds and apply them promptly once released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-13T01:26:53.028Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb365

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:59:52 AM

Last updated: 11/29/2025, 11:35:13 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats