Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30064: CWE-190: Integer Overflow or Wraparound in Microsoft Windows Server 2022

0
High
VulnerabilityCVE-2024-30064cvecve-2024-30064cwe-190
Published: Tue Jun 11 2024 (06/11/2024, 16:59:50 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2022

Description

Windows Kernel Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 12/17/2025, 23:33:12 UTC

Technical Analysis

CVE-2024-30064 is an integer overflow or wraparound vulnerability classified under CWE-190 affecting the Windows Kernel component of Microsoft Windows Server 2022 (version 10.0.20348.0). The vulnerability arises when the kernel improperly processes integer values, leading to an overflow condition that can corrupt memory management structures. This corruption can be exploited by a local attacker with limited privileges (PR:L) to escalate their privileges to SYSTEM level, thereby gaining full control over the affected system. The attack vector requires local access but no user interaction (UI:N), and the vulnerability has a scope of changed (S:C), meaning the attacker can affect resources beyond their initial privileges. The CVSS v3.1 base score is 8.8, indicating a high severity with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits or patches are currently available, but the vulnerability is recognized and tracked by Microsoft and CISA. The flaw’s exploitation could allow attackers to execute arbitrary code in kernel mode, bypass security controls, and compromise critical server workloads. This vulnerability is particularly concerning for organizations relying on Windows Server 2022 for critical infrastructure, cloud services, and enterprise applications.

Potential Impact

The impact of CVE-2024-30064 on European organizations is significant due to the widespread deployment of Windows Server 2022 in enterprise, government, and cloud environments. Successful exploitation enables attackers to gain SYSTEM-level privileges, effectively compromising the entire server. This can lead to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within networks. For sectors such as finance, healthcare, energy, and public administration, the compromise of Windows Server infrastructure could result in severe operational and reputational damage. Additionally, the vulnerability’s ability to affect confidentiality, integrity, and availability simultaneously increases the risk of data breaches, ransomware deployment, and persistent threats. The lack of known exploits in the wild currently provides a window for proactive defense, but the high severity score underscores the urgency for mitigation. European organizations with compliance obligations under GDPR and other regulations must prioritize addressing this vulnerability to avoid legal and financial penalties.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates immediately once released for Windows Server 2022 (build 10.0.20348.0). 2. Implement strict access controls and limit local user privileges to reduce the risk of exploitation by low-privileged users. 3. Employ endpoint detection and response (EDR) solutions capable of detecting unusual kernel-level activities or privilege escalation attempts. 4. Conduct regular security audits and vulnerability scans focused on Windows Server environments to identify unpatched systems. 5. Use application whitelisting and kernel-mode code integrity policies to prevent unauthorized code execution in kernel space. 6. Segment critical server infrastructure to contain potential breaches and limit lateral movement. 7. Maintain comprehensive logging and alerting on privilege escalation events and anomalous system behavior. 8. Educate system administrators on the risks of local privilege escalation vulnerabilities and best practices for secure server management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:14.565Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0cc

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 12/17/2025, 11:33:12 PM

Last updated: 1/19/2026, 9:57:19 AM

Views: 38

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats