Skip to main content

CVE-2024-30022: CWE-197: Numeric Truncation Error in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-30022cvecve-2024-30022cwe-197
Published: Tue May 14 2024 (05/14/2024, 16:57:14 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 02:42:33 UTC

Technical Analysis

CVE-2024-30022 is a high-severity remote code execution vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0), specifically within the Windows Routing and Remote Access Service (RRAS). The root cause is a numeric truncation error (CWE-197), which occurs when a numeric value is improperly truncated, potentially leading to memory corruption or logic errors. Exploiting this flaw allows an unauthenticated remote attacker to execute arbitrary code on the vulnerable system by sending specially crafted network packets to the RRAS service. The vulnerability requires no privileges but does require user interaction, likely in the form of triggering the service to process malicious input. The CVSS v3.1 base score is 7.5 (high), with attack vector network (AV:N), attack complexity high (AC:H), no privileges required (PR:N), user interaction required (UI:R), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). The scope remains unchanged (S:U), meaning the exploit affects only the vulnerable component and does not extend to other system components. No known exploits are currently reported in the wild, and no official patches have been linked yet. This vulnerability is significant because RRAS is often enabled in enterprise environments for VPN and routing purposes, making affected systems potentially exposed to remote attacks if RRAS is accessible over the network. The numeric truncation error could allow attackers to bypass normal input validation, leading to memory corruption and remote code execution, which could be leveraged for full system compromise.

Potential Impact

For European organizations, the impact of CVE-2024-30022 could be substantial, especially for enterprises and service providers relying on Windows 10 Version 1809 systems with RRAS enabled for remote access or routing services. Successful exploitation could lead to full system compromise, allowing attackers to steal sensitive data, disrupt network services, or establish persistent footholds. This is particularly critical for sectors such as finance, healthcare, government, and critical infrastructure, where confidentiality and availability are paramount. Since the vulnerability requires user interaction but no authentication, phishing or social engineering combined with network exposure could facilitate attacks. Organizations with legacy Windows 10 1809 deployments, especially those that have not migrated to newer Windows versions or applied mitigations, are at higher risk. The potential for lateral movement within networks and disruption of remote access services could also impact business continuity and incident response capabilities.

Mitigation Recommendations

1. Immediate mitigation should focus on disabling or restricting access to the RRAS service if it is not essential, especially blocking RRAS-related ports at network perimeters and firewalls to limit exposure. 2. For systems requiring RRAS, implement strict network segmentation and access controls to limit which hosts can communicate with RRAS endpoints. 3. Employ network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous or malformed RRAS traffic patterns indicative of exploitation attempts. 4. Enforce multi-factor authentication and strong endpoint security to reduce the risk of user interaction leading to exploitation. 5. Monitor system and network logs for unusual activity related to RRAS and Windows networking components. 6. Plan and prioritize upgrading affected Windows 10 Version 1809 systems to supported, patched versions of Windows where this vulnerability is resolved. 7. Stay alert for official Microsoft patches or workarounds and apply them promptly once available. 8. Conduct user awareness training to reduce risky behaviors that could trigger user interaction exploitation vectors. These steps go beyond generic advice by focusing on RRAS-specific controls, network-level protections, and operational practices tailored to this vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:12.403Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb63f

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 2:42:33 AM

Last updated: 7/31/2025, 11:04:40 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats