Skip to main content

CVE-2024-30009: CWE-197: Numeric Truncation Error in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-30009cvecve-2024-30009cwe-197
Published: Tue May 14 2024 (05/14/2024, 16:57:07 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 02:57:04 UTC

Technical Analysis

CVE-2024-30009 is a high-severity remote code execution vulnerability affecting Microsoft Windows 10 Version 1809, specifically impacting the Routing and Remote Access Service (RRAS). The root cause is a numeric truncation error (CWE-197), which occurs when a numeric value is improperly truncated, potentially leading to memory corruption or unexpected behavior. This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on the affected system by sending specially crafted packets to the RRAS component. The vulnerability requires no privileges and no user interaction, making it highly exploitable over the network. The CVSS v3.1 score of 8.8 reflects the critical nature of this flaw, with high impact on confidentiality, integrity, and availability. Exploitation could lead to full system compromise, allowing attackers to execute arbitrary code with system-level privileges, potentially enabling installation of malware, data theft, or disruption of network services. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact necessitate immediate attention. The affected version, Windows 10 1809 (build 10.0.17763.0), is an older release but still in use in some enterprise environments, especially those with legacy systems or delayed upgrade cycles. The lack of an official patch link suggests that remediation may require applying cumulative updates or workarounds recommended by Microsoft once available.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly for enterprises and government agencies still operating Windows 10 Version 1809. The RRAS service is often used in corporate environments to provide VPN and routing capabilities, making it a critical network component. Successful exploitation could lead to unauthorized remote access, data breaches, lateral movement within networks, and disruption of essential network services. This could impact confidentiality of sensitive data, integrity of systems, and availability of network infrastructure. Sectors such as finance, healthcare, critical infrastructure, and public administration are especially at risk due to their reliance on secure remote access and legacy Windows deployments. Additionally, the vulnerability could be leveraged in targeted attacks or ransomware campaigns, amplifying operational and reputational damage. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score indicates that exploitation is likely feasible and impactful.

Mitigation Recommendations

1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched version of Windows 10 or Windows 11 to eliminate the vulnerability. 2. If immediate upgrade is not feasible, disable the Routing and Remote Access Service (RRAS) on systems where it is not essential to reduce the attack surface. 3. Implement network-level controls such as firewall rules to restrict inbound traffic to RRAS ports (typically TCP/UDP 1723 and GRE protocol 47) only to trusted sources. 4. Monitor network traffic for anomalous or unexpected packets targeting RRAS services to detect potential exploitation attempts. 5. Apply any interim mitigations or patches released by Microsoft as soon as they become available, and subscribe to official security advisories for updates. 6. Conduct thorough asset inventory to identify all systems running Windows 10 Version 1809 and RRAS, ensuring no unmanaged devices remain vulnerable. 7. Employ network segmentation to isolate legacy systems and limit lateral movement in case of compromise. 8. Enhance endpoint detection and response (EDR) capabilities to identify suspicious activity indicative of exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:12.400Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb5cf

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 2:57:04 AM

Last updated: 8/12/2025, 2:02:59 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats