Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30069: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-30069cvecve-2024-30069cwe-126
Published: Tue Jun 11 2024 (06/11/2024, 16:59:40 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Remote Access Connection Manager Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 12/17/2025, 23:34:19 UTC

Technical Analysis

CVE-2024-30069 is a buffer over-read vulnerability classified under CWE-126 found in the Windows Remote Access Connection Manager on Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises when the component improperly handles memory bounds during processing, allowing an attacker with local access and low privileges to read memory beyond the intended buffer limits. The flaw does not require user interaction but has a high attack complexity, meaning exploitation is non-trivial and likely requires specific conditions or knowledge. The impact is an information disclosure, compromising confidentiality by potentially exposing sensitive data stored in memory. The vulnerability does not affect system integrity or availability. The CVSS 3.1 score is 4.7 (medium), reflecting the limited attack vector (local), the need for privileges, and high complexity. No public exploits or active exploitation have been reported as of the publication date. The vulnerability was reserved in March 2024 and published in June 2024, with no patches currently linked, indicating that mitigation may require upgrading or awaiting official fixes. This vulnerability is relevant for organizations still running the legacy Windows 10 1809 version, which is out of mainstream support, increasing risk due to lack of automatic updates.

Potential Impact

For European organizations, the primary impact is the potential unauthorized disclosure of sensitive information due to the buffer over-read in a core Windows networking component. This could lead to leakage of credentials, configuration data, or other sensitive memory contents, which attackers could leverage for further attacks or lateral movement. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face increased risk of compliance violations and reputational damage if sensitive data is exposed. Since the vulnerability requires local access and privileges, insider threats or attackers who have already compromised lower-privileged accounts pose the greatest risk. The lack of impact on integrity and availability reduces the risk of system disruption but does not diminish the confidentiality concerns. The medium severity rating suggests that while the threat is not critical, it should not be ignored, especially in environments where legacy Windows 10 versions remain in use.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1809 to a supported and fully patched Windows version (e.g., Windows 10 21H2 or later, or Windows 11). 2. If upgrading is not immediately feasible, implement strict access controls to limit local user privileges and prevent untrusted users from gaining local access. 3. Monitor systems for unusual local activity that could indicate attempts to exploit this vulnerability. 4. Apply any Microsoft security updates or patches as soon as they become available for this vulnerability. 5. Employ endpoint detection and response (EDR) solutions to detect anomalous memory access patterns or exploitation attempts. 6. Conduct regular audits of user privileges and remove unnecessary local accounts to reduce the attack surface. 7. Educate IT staff about the risks of running unsupported Windows versions and encourage timely patch management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:14.566Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0e1

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 12/17/2025, 11:34:19 PM

Last updated: 1/19/2026, 7:57:29 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats