Skip to main content

CVE-2024-29994: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-29994cvecve-2024-29994cwe-125
Published: Tue May 14 2024 (05/14/2024, 16:57:18 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft Windows SCSI Class System File Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 03:00:39 UTC

Technical Analysis

CVE-2024-29994 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-125, which corresponds to an out-of-bounds read condition. Specifically, this flaw exists within the Windows SCSI Class System driver, a core component responsible for managing communication between the operating system and SCSI devices. An out-of-bounds read occurs when the software reads data beyond the boundaries of allocated memory buffers, potentially leading to the disclosure of sensitive information or triggering undefined behavior that can be leveraged to escalate privileges. The CVSS 3.1 base score of 7.8 reflects a high severity, with the vector indicating that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means that an attacker with limited privileges on a vulnerable system can exploit this vulnerability to gain elevated privileges, potentially gaining full control over the system. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require close monitoring for forthcoming updates. The vulnerability was reserved in March 2024 and published in May 2024, suggesting it is a recent discovery. The lack of user interaction and the low complexity of exploitation make this a significant risk for affected systems, especially in environments where Windows 10 Version 1809 is still in use, despite it being an older version of Windows 10.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, particularly for those still operating legacy systems running Windows 10 Version 1809. The ability for an attacker with limited local privileges to escalate to full system control can lead to severe consequences including unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within corporate networks. Industries such as finance, healthcare, manufacturing, and critical infrastructure, which often rely on legacy systems for operational continuity, are especially vulnerable. The high impact on confidentiality, integrity, and availability means that exploitation could result in data breaches, operational downtime, and loss of trust. Additionally, the vulnerability could be leveraged in targeted attacks against European organizations with valuable intellectual property or sensitive personal data protected under GDPR. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the ease of exploitation and high impact necessitate urgent attention.

Mitigation Recommendations

Given the absence of an official patch at this time, European organizations should implement specific mitigations beyond generic advice: 1) Conduct an immediate inventory to identify all systems running Windows 10 Version 1809 and prioritize them for remediation or upgrade. 2) Restrict local access to vulnerable systems by enforcing strict access controls, limiting administrative privileges, and using endpoint protection solutions that monitor for suspicious local activity. 3) Employ application whitelisting and behavior-based detection to identify attempts to exploit out-of-bounds memory reads or privilege escalation. 4) Isolate legacy systems from critical network segments to reduce the risk of lateral movement if compromised. 5) Monitor system logs and security alerts for unusual activity indicative of exploitation attempts, especially those involving SCSI driver interactions. 6) Prepare for rapid deployment of patches once Microsoft releases an official fix, including testing in controlled environments to ensure compatibility. 7) Educate IT staff about the vulnerability specifics to enhance detection and response capabilities. These targeted actions will help mitigate risk until a formal patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:11.048Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb538

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 3:00:39 AM

Last updated: 7/31/2025, 3:19:21 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats