Skip to main content

CVE-2024-30024: CWE-197: Numeric Truncation Error in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-30024cvecve-2024-30024cwe-197
Published: Tue May 14 2024 (05/14/2024, 16:57:19 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 02:42:08 UTC

Technical Analysis

CVE-2024-30024 is a high-severity remote code execution vulnerability affecting Microsoft Windows 10 Version 1809, specifically targeting the Windows Routing and Remote Access Service (RRAS). The root cause is a numeric truncation error (CWE-197), which occurs when a numeric value is improperly truncated, leading to unexpected behavior in memory handling. This vulnerability allows an unauthenticated attacker to remotely execute arbitrary code on the affected system by sending specially crafted network packets to the RRAS component. Exploitation requires network access but no prior authentication, although user interaction is required, likely in the form of triggering the vulnerable service to process malicious input. The CVSS 3.1 base score is 7.5, reflecting high impact on confidentiality, integrity, and availability, but with a higher attack complexity and requirement for user interaction. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, a version that has been out of mainstream support since January 2023 but may still be in use in certain environments. No known exploits are currently reported in the wild, but the presence of a remote code execution vector in a network-facing service makes this a significant risk, especially in enterprise and critical infrastructure environments where RRAS is enabled for VPN or routing purposes. The numeric truncation error could lead to memory corruption, enabling attackers to execute arbitrary code with system privileges, potentially leading to full system compromise.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for those still operating legacy Windows 10 Version 1809 systems in critical roles such as remote access gateways, VPN concentrators, or routing services. Successful exploitation could lead to unauthorized access, data exfiltration, disruption of network services, and lateral movement within corporate networks. This is especially concerning for sectors like finance, healthcare, government, and critical infrastructure where confidentiality and availability are paramount. The vulnerability could facilitate espionage, ransomware deployment, or sabotage. Given that no authentication is required and the attack vector is network-based, exposed RRAS services on public or internal networks represent a high-risk attack surface. The requirement for user interaction may limit automated mass exploitation but does not eliminate targeted attacks. Organizations relying on Windows 10 Version 1809 for legacy applications or embedded systems may face increased risk due to lack of vendor support and delayed patching.

Mitigation Recommendations

1. Immediate mitigation should focus on disabling or restricting access to the RRAS service if it is not essential. This includes blocking RRAS-related ports at network boundaries and limiting RRAS usage to trusted internal networks only. 2. For systems that must run Windows 10 Version 1809 with RRAS enabled, implement strict network segmentation and firewall rules to minimize exposure. 3. Monitor network traffic for anomalous packets targeting RRAS and enable enhanced logging to detect potential exploitation attempts. 4. Since no official patch is currently linked, organizations should engage with Microsoft support or their enterprise support channels to obtain any available security updates or workarounds. 5. Consider upgrading affected systems to a supported Windows version with ongoing security updates to eliminate exposure to this and similar vulnerabilities. 6. Employ endpoint detection and response (EDR) solutions capable of detecting suspicious activity related to RRAS exploitation attempts. 7. Conduct regular vulnerability assessments and penetration testing focused on RRAS and remote access infrastructure to identify and remediate exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:12.403Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb645

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 2:42:08 AM

Last updated: 8/8/2025, 12:31:37 PM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats