Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30079: CWE-126: Buffer Over-read in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-30079cvecve-2024-30079cwe-126
Published: Tue Jul 09 2024 (07/09/2024, 17:02:41 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

CVE-2024-30079 is a high-severity buffer over-read vulnerability in the Windows Remote Access Connection Manager component affecting Windows 10 Version 1809 (build 10. 0. 17763. 0). This flaw allows an attacker with limited privileges to elevate their privileges without user interaction by exploiting improper handling of memory buffers. The vulnerability impacts confidentiality, integrity, and availability, potentially enabling full system compromise. No known exploits are currently reported in the wild, but the vulnerability is critical due to its high CVSS score (7. 8) and the sensitive nature of the affected component. European organizations using legacy Windows 10 1809 systems, especially in sectors relying on remote access services, are at risk. Mitigation requires applying security updates once available or implementing strict access controls and network segmentation to limit exposure.

AI-Powered Analysis

AILast updated: 12/17/2025, 00:34:20 UTC

Technical Analysis

CVE-2024-30079 is a buffer over-read vulnerability classified under CWE-126 found in the Windows Remote Access Connection Manager on Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises from improper validation of memory buffers, allowing an attacker with low-level privileges (PR:L) to read beyond the intended buffer boundaries. This can lead to elevation of privilege (EoP) without requiring user interaction (UI:N), enabling the attacker to gain higher system privileges than originally granted. The vulnerability affects confidentiality, integrity, and availability (C:H/I:H/A:H), meaning an attacker could potentially access sensitive information, modify system configurations, or disrupt services. The attack vector is local (AV:L), requiring the attacker to have some access to the system but with low complexity (AC:L). The scope is unchanged (S:U), indicating the impact is limited to the vulnerable component and does not extend beyond the affected system. Although no known exploits are currently reported in the wild, the vulnerability is rated high severity with a CVSS score of 7.8, reflecting the significant risk posed if exploited. The Remote Access Connection Manager is critical for managing VPN and dial-up connections, making this vulnerability particularly concerning for environments relying on remote connectivity. The vulnerability was reserved in March 2024 and published in July 2024, with no patches currently linked, indicating organizations must monitor for updates and apply them promptly once available.

Potential Impact

For European organizations, the impact of CVE-2024-30079 is significant, especially for those still operating Windows 10 Version 1809 in production environments. The vulnerability allows attackers with limited privileges to escalate their access, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of remote access services, and potential lateral movement within networks. Sectors such as finance, healthcare, government, and critical infrastructure that rely heavily on secure remote access are particularly at risk. The confidentiality breach could expose personal and corporate data, while integrity and availability impacts could disrupt business operations and critical services. Given the local attack vector, insider threats or attackers who have gained initial footholds could leverage this vulnerability to deepen their access. The absence of known exploits currently provides a window for proactive defense, but the high severity score necessitates urgent mitigation to prevent future exploitation.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches immediately once released for Windows 10 Version 1809 systems. 2. If patching is not immediately possible, restrict access to systems running the vulnerable version by implementing strict network segmentation and access controls, limiting local user privileges. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and prevent suspicious activities related to privilege escalation attempts. 4. Conduct regular audits of user privileges and remove unnecessary local accounts or restrict their capabilities to minimize potential attack vectors. 5. Educate IT staff and users about the risks of local privilege escalation vulnerabilities and enforce policies to prevent unauthorized software installations or execution. 6. Consider upgrading affected systems to supported Windows versions with ongoing security updates to reduce exposure to legacy vulnerabilities. 7. Implement multi-factor authentication (MFA) for remote access services to add an additional layer of security against compromised credentials.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:14.568Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb5b8

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 12/17/2025, 12:34:20 AM

Last updated: 1/19/2026, 7:57:15 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats