Skip to main content

CVE-2024-30079: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-30079cvecve-2024-30079cwe-126
Published: Tue Jul 09 2024 (07/09/2024, 17:02:41 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Remote Access Connection Manager Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/05/2025, 20:12:43 UTC

Technical Analysis

CVE-2024-30079 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is categorized as a CWE-126: Buffer Over-read, which occurs when a program reads data beyond the boundaries of a buffer, potentially leading to information disclosure or memory corruption. Specifically, this flaw exists in the Windows Remote Access Connection Manager component, a service responsible for managing remote network connections. An attacker with limited privileges (local access with low privileges) can exploit this vulnerability to read sensitive memory contents beyond allocated buffers. This can lead to elevation of privilege, allowing the attacker to gain higher system privileges without requiring user interaction. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability (all rated high), with low attack complexity and requiring only limited privileges but no user interaction. Although no known exploits are currently reported in the wild, the vulnerability is publicly disclosed and could be targeted by attackers seeking to escalate privileges on vulnerable systems. The lack of available patches at the time of disclosure increases the risk for unpatched systems. This vulnerability is particularly critical because it affects a widely deployed Windows 10 version that is still in use in many enterprise environments, especially those with legacy systems or delayed upgrade cycles.

Potential Impact

For European organizations, the impact of CVE-2024-30079 could be significant. Many enterprises and public sector entities in Europe continue to operate Windows 10 Version 1809 due to compatibility requirements or slow migration to newer OS versions. Exploitation of this vulnerability could allow attackers who have gained limited local access—such as through phishing, compromised credentials, or insider threats—to escalate privileges and gain full control over affected systems. This could lead to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within corporate networks. Sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitive nature of their data and the potential for operational disruption. Additionally, the vulnerability could be leveraged in targeted attacks or ransomware campaigns, increasing the risk of data breaches and operational downtime. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score indicates that organizations should prioritize addressing this vulnerability to prevent future exploitation.

Mitigation Recommendations

European organizations should take immediate and specific steps to mitigate the risk posed by CVE-2024-30079 beyond generic patching advice. First, identify and inventory all systems running Windows 10 Version 1809, prioritizing those with Remote Access Connection Manager enabled or in use. Since no official patches are currently linked, organizations should monitor Microsoft’s security advisories closely and apply patches as soon as they become available. In the interim, implement strict access controls to limit local user privileges and restrict access to systems running the vulnerable OS version. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behavior indicative of privilege escalation attempts. Network segmentation should be enforced to contain potential lateral movement from compromised hosts. Additionally, review and harden remote access policies, disable unnecessary remote access services, and enforce multi-factor authentication (MFA) for all remote and local logins. Conduct user awareness training to reduce the risk of initial compromise vectors that could lead to exploitation of this vulnerability. Finally, consider accelerating migration plans to supported Windows versions with active security updates to reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:14.568Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb5b8

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/5/2025, 8:12:43 PM

Last updated: 8/9/2025, 12:09:22 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats