Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30068: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-30068cvecve-2024-30068cwe-125
Published: Tue Jun 11 2024 (06/11/2024, 16:59:52 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kernel Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 12/17/2025, 23:34:02 UTC

Technical Analysis

CVE-2024-30068 is an out-of-bounds read vulnerability classified under CWE-125 affecting the Windows 10 Version 1809 kernel (build 10.0.17763.0). This flaw allows an attacker with limited privileges (low-level local user) to read memory outside the intended buffer boundaries within the kernel space. Such unauthorized memory access can lead to elevation of privilege by leaking sensitive kernel data or corrupting kernel memory structures, potentially enabling arbitrary code execution or system compromise. The vulnerability has a CVSS v3.1 base score of 8.8, indicating high severity, with attack vector Local (AV:L), low attack complexity (AC:L), requiring privileges (PR:L), and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Confidentiality, integrity, and availability impacts are all rated high (C:H/I:H/A:H). Although no public exploits are currently known, the vulnerability’s characteristics make it a prime candidate for exploitation in targeted attacks or malware aiming for privilege escalation. The vulnerability was reserved in March 2024 and published in June 2024. No official patch links were provided in the source data, but Microsoft typically addresses such kernel vulnerabilities in security updates. The vulnerability is particularly dangerous because kernel-level exploits can bypass most security controls, leading to full system compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the widespread use of Windows 10 Version 1809 in enterprise environments, especially in legacy systems that have not been upgraded. Successful exploitation could allow attackers to escalate privileges from a low-privileged user to SYSTEM level, enabling full control over affected machines. This can lead to data breaches, disruption of critical services, and deployment of persistent malware such as ransomware. Sectors like government, finance, healthcare, and critical infrastructure are particularly vulnerable given their reliance on Windows systems and the high value of their data. The vulnerability’s ability to compromise confidentiality, integrity, and availability simultaneously increases the potential impact on organizational operations and compliance with European data protection regulations such as GDPR. Additionally, the local attack vector means insider threats or compromised user accounts could be leveraged to exploit this flaw, increasing the attack surface within organizations.

Mitigation Recommendations

Organizations should prioritize applying the official Microsoft security update addressing CVE-2024-30068 as soon as it becomes available. If patching is not immediately possible, upgrading to a supported and more recent Windows version is strongly recommended, as Windows 10 Version 1809 is nearing or past end-of-support status. Restrict local access to systems by enforcing strict access controls, limiting administrative privileges, and using endpoint protection solutions capable of monitoring kernel-level activity for anomalies. Employ application whitelisting and behavior-based detection to identify potential exploitation attempts. Conduct regular audits of user privileges and monitor logs for suspicious local activity indicative of privilege escalation attempts. For critical systems, consider network segmentation to reduce the risk of lateral movement following exploitation. Finally, maintain an incident response plan that includes procedures for kernel-level compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:14.566Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0df

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 12/17/2025, 11:34:02 PM

Last updated: 1/18/2026, 10:01:54 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats