Skip to main content

CVE-2024-30015: CWE-197: Numeric Truncation Error in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-30015cvecve-2024-30015cwe-197
Published: Tue May 14 2024 (05/14/2024, 16:57:10 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 02:45:37 UTC

Technical Analysis

CVE-2024-30015 is a high-severity remote code execution vulnerability affecting Microsoft Windows 10 Version 1809, specifically version 10.0.17763.0. The vulnerability resides in the Windows Routing and Remote Access Service (RRAS), a component responsible for routing network traffic and providing remote access capabilities. The root cause is a numeric truncation error (CWE-197), which occurs when a numeric value is improperly truncated during processing, potentially leading to memory corruption. This flaw can be exploited remotely without requiring authentication, but user interaction is necessary, as indicated by the CVSS vector (UI:R). The vulnerability has a CVSS v3.1 base score of 7.5, reflecting high severity with impacts on confidentiality, integrity, and availability (all rated high). The attack vector is network-based (AV:N), but the complexity is high (AC:H), meaning exploitation requires specific conditions or knowledge. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability could allow an attacker to execute arbitrary code remotely via specially crafted network packets targeting RRAS, potentially leading to full system compromise or disruption of network services. Given the affected Windows version is an older release (1809), many organizations may still have legacy systems vulnerable if not updated or patched. The numeric truncation error suggests that improper handling of numeric data in RRAS can be leveraged to corrupt memory and hijack execution flow, a common vector for remote code execution in network services.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for those relying on Windows 10 Version 1809 in their infrastructure. RRAS is often used in enterprise environments to enable VPNs, remote access, and routing services. Exploitation could lead to unauthorized remote code execution, allowing attackers to gain control over affected systems, steal sensitive data, disrupt network connectivity, or pivot within internal networks. This poses a risk to confidentiality, integrity, and availability of critical systems. Sectors such as finance, healthcare, government, and critical infrastructure that rely on remote access services are particularly at risk. The high complexity of exploitation may reduce the likelihood of widespread attacks in the short term, but the lack of authentication requirement and network attack vector mean that once an exploit is developed, attacks could be launched remotely with relative ease. The absence of known exploits in the wild currently provides a window for mitigation, but organizations must act proactively to prevent potential future attacks.

Mitigation Recommendations

Identify and inventory all systems running Windows 10 Version 1809 (build 10.0.17763.0) within the organization, focusing on those running RRAS. Apply the official Microsoft security update or patch as soon as it becomes available to remediate the vulnerability. Monitor Microsoft security advisories closely for patch release. If patching is not immediately possible, consider disabling or restricting RRAS services on affected systems, especially those exposed to untrusted networks. Implement network-level controls such as firewall rules to limit inbound access to RRAS ports (e.g., PPTP, L2TP, SSTP) from untrusted or external sources. Use network segmentation to isolate legacy systems running Windows 10 Version 1809 from critical network segments and sensitive data repositories. Deploy intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect anomalous RRAS traffic patterns that may indicate exploitation attempts. Enforce strict user interaction policies and educate users about the risks of interacting with unsolicited network prompts or remote access requests. Plan and execute a migration strategy to upgrade legacy Windows 10 Version 1809 systems to supported, fully patched Windows versions to reduce exposure to this and other vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:12.401Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb5ec

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 2:45:37 AM

Last updated: 7/31/2025, 7:44:20 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats