Skip to main content

CVE-2024-30064: CWE-190: Integer Overflow or Wraparound in Microsoft Windows Server 2022

High
VulnerabilityCVE-2024-30064cvecve-2024-30064cwe-190
Published: Tue Jun 11 2024 (06/11/2024, 16:59:50 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2022

Description

Windows Kernel Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 17:41:10 UTC

Technical Analysis

CVE-2024-30064 is a high-severity integer overflow or wraparound vulnerability (CWE-190) affecting Microsoft Windows Server 2022, specifically version 10.0.20348.0. This vulnerability exists within the Windows Kernel and allows for an elevation of privilege attack. An integer overflow occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around to an unexpected number. In the context of the Windows Kernel, such an overflow can lead to improper handling of memory or logic errors that attackers can exploit to escalate their privileges on the system. The CVSS 3.1 base score is 8.8, indicating a high severity with the following vector: Attack Vector is local (AV:L), requiring low attack complexity (AC:L), and low privileges (PR:L). No user interaction (UI:N) is needed, and the scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), suggesting that successful exploitation could allow attackers to fully compromise the system. The vulnerability was published on June 11, 2024, and no known exploits are currently observed in the wild. No patches or mitigations have been linked yet, but given the critical nature of the Windows Kernel and the severity score, this vulnerability represents a significant risk to affected systems. Attackers with local access and low privileges could leverage this flaw to gain full control over the system, bypassing security restrictions and potentially deploying further malware or conducting lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2024-30064 is substantial, especially for those relying on Windows Server 2022 in critical infrastructure, enterprise environments, and cloud services. Successful exploitation could lead to full system compromise, allowing attackers to access sensitive data, disrupt services, or use compromised servers as footholds for broader network attacks. Given the high impact on confidentiality, integrity, and availability, organizations could face data breaches, operational downtime, and regulatory compliance issues under GDPR and other data protection laws. The local attack vector implies that attackers need some level of access to the system, which could be achieved through phishing, compromised credentials, or insider threats. The lack of required user interaction increases the risk of automated or stealthy exploitation once local access is obtained. This vulnerability could also be leveraged in targeted attacks against high-value European targets such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators, potentially causing significant economic and societal disruption.

Mitigation Recommendations

1. Immediate deployment of security updates from Microsoft once available is critical. Organizations should monitor official Microsoft security advisories and apply patches promptly. 2. Implement strict access controls and network segmentation to limit local access to Windows Server 2022 systems, reducing the attack surface for local privilege escalation. 3. Employ robust endpoint detection and response (EDR) solutions capable of detecting anomalous kernel-level activities indicative of exploitation attempts. 4. Enforce the principle of least privilege for all users and service accounts to minimize the impact of compromised credentials. 5. Regularly audit and monitor logs for unusual local activity or privilege escalation attempts. 6. Consider using virtualization-based security features and kernel protection mechanisms available in Windows Server 2022 to mitigate exploitation risks. 7. Conduct user training to prevent initial compromise vectors that could lead to local access, such as phishing. 8. Prepare incident response plans specifically addressing kernel-level compromises to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:14.565Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0cc

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:41:10 PM

Last updated: 7/29/2025, 4:12:04 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats