Skip to main content

CVE-2024-30072: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 11 version 22H2

High
VulnerabilityCVE-2024-30072cvecve-2024-30072cwe-190
Published: Tue Jun 11 2024 (06/11/2024, 16:59:41 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 11 version 22H2

Description

Microsoft Event Trace Log File Parsing Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 17:43:09 UTC

Technical Analysis

CVE-2024-30072 is a high-severity integer overflow or wraparound vulnerability (CWE-190) affecting Microsoft Windows 11 version 22H2 (build 10.0.22621.0). The vulnerability arises in the parsing of Event Trace Log (ETL) files, which are used by Windows for logging system and application events. An integer overflow occurs when the software incorrectly handles numeric values during the parsing process, potentially allowing an attacker to craft a malicious ETL file that triggers the overflow. This can lead to remote code execution (RCE) with high impact on confidentiality, integrity, and availability. The CVSS 3.1 base score is 7.8, indicating a high severity level. The attack vector is local (AV:L), meaning the attacker needs local access to the system, but no privileges are required (PR:N). User interaction is required (UI:R), such as opening or processing a malicious ETL file. The vulnerability affects the Windows Event Trace Log parsing component, which is a critical system service. Exploitation could allow an attacker to execute arbitrary code in the context of the affected user, potentially escalating privileges or compromising the system. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in March 2024 and published in June 2024. Given the nature of ETL files, this vulnerability could be exploited via social engineering or malicious software delivery mechanisms that cause a user to open or process a crafted ETL file.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in environments where Windows 11 version 22H2 is widely deployed. Successful exploitation could lead to remote code execution, allowing attackers to gain unauthorized access, execute arbitrary code, and potentially move laterally within networks. This threatens the confidentiality of sensitive data, integrity of systems, and availability of critical services. Sectors such as finance, healthcare, government, and critical infrastructure in Europe, which rely heavily on Windows 11 endpoints, could face operational disruptions, data breaches, and compliance violations under GDPR. The local attack vector and requirement for user interaction somewhat limit the attack surface but do not eliminate risk, as phishing or insider threats could trigger exploitation. The absence of known exploits in the wild currently reduces immediate risk but organizations should act proactively given the high severity and potential impact.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Monitor Microsoft security advisories closely for the release of official patches addressing CVE-2024-30072 and apply them promptly once available. 2) Restrict the handling and opening of ETL files to trusted users and systems only, employing application whitelisting or file type restrictions where feasible. 3) Educate users about the risks of opening unsolicited or suspicious ETL files, integrating this into phishing awareness training. 4) Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior related to ETL file processing or suspicious code execution. 5) Use network segmentation to limit lateral movement in case of compromise. 6) Review and harden local user permissions to minimize the impact of code execution under user context. 7) Implement strict email filtering and attachment scanning to block or flag ETL files from untrusted sources. These targeted actions go beyond generic patching advice and focus on reducing exposure and detection capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:14.567Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec0e5

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:43:09 PM

Last updated: 8/11/2025, 6:41:37 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats