Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30070: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows Server 2019

0
High
VulnerabilityCVE-2024-30070cvecve-2024-30070cwe-191
Published: Tue Jun 11 2024 (06/11/2024, 16:59:41 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

DHCP Server Service Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 12/17/2025, 23:34:35 UTC

Technical Analysis

CVE-2024-30070 is an integer underflow vulnerability classified under CWE-191 affecting the DHCP Server service in Microsoft Windows Server 2019, specifically version 10.0.17763.0. The flaw arises when the DHCP Server processes certain crafted DHCP packets that cause an integer wraparound condition. This underflow can lead to memory corruption or logic errors that ultimately crash the DHCP Server service, resulting in a denial of service (DoS) condition. The vulnerability requires no authentication, no user interaction, and can be exploited remotely over the network, making it highly accessible to attackers. The CVSS v3.1 base score is 7.5, indicating high severity primarily due to the impact on availability (A:H) and the low attack complexity (AC:L). The exploitability is rated as functional (E:P), and the remediation level is official (RL:O) with confirmed fix status (RC:C), though no patch links are currently provided. No known exploits have been reported in the wild yet, but the vulnerability poses a significant risk to environments running the affected Windows Server 2019 build, especially those that rely heavily on DHCP for network management. The DHCP Server is a critical component for IP address allocation and network configuration, so disruption can lead to widespread network outages and operational impact.

Potential Impact

For European organizations, this vulnerability can cause significant disruption to network services by incapacitating the DHCP Server, which is essential for dynamic IP address allocation and network configuration. A successful attack could result in denial of service, preventing clients from obtaining or renewing IP addresses, leading to loss of network connectivity for affected devices. This can impact enterprise IT environments, data centers, cloud service providers, and critical infrastructure sectors such as telecommunications, finance, healthcare, and government services. The availability impact is particularly concerning for organizations with large-scale deployments of Windows Server 2019 DHCP services, as network outages can cascade into operational downtime and service degradation. Additionally, the lack of authentication and user interaction requirements increases the risk of automated or widespread exploitation attempts. While no exploits are currently known in the wild, the vulnerability’s characteristics make it a likely target for attackers aiming to disrupt services or conduct denial of service attacks against European organizations.

Mitigation Recommendations

Organizations should monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available to remediate this vulnerability. In the interim, network administrators should implement network-level protections such as filtering or blocking suspicious DHCP traffic from untrusted sources, especially at network perimeters and between network segments. Deploying intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting anomalous DHCP packets can help detect and mitigate exploitation attempts. Restricting DHCP server access to trusted management networks and limiting exposure to the internet or untrusted networks reduces attack surface. Regularly auditing and hardening DHCP server configurations, including disabling unnecessary services and enabling logging, can aid in early detection of exploitation attempts. Organizations should also consider deploying redundant DHCP servers or failover configurations to maintain availability in case of service disruption. Finally, conducting internal vulnerability assessments and penetration testing focused on DHCP services can help identify and address potential weaknesses proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:14.566Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0e3

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 12/17/2025, 11:34:35 PM

Last updated: 1/17/2026, 9:15:32 AM

Views: 48

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats