Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-30088: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-30088cvecve-2024-30088cwe-367
Published: Tue Jun 11 2024 (06/11/2024, 16:59:56 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kernel Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 10/21/2025, 21:11:09 UTC

Technical Analysis

CVE-2024-30088 is a kernel-level elevation of privilege vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The root cause is a Time-of-check Time-of-use (TOCTOU) race condition (CWE-367), where the system improperly handles timing between checking a condition and using the resource, allowing an attacker to manipulate the state between these operations. This flaw exists in the Windows kernel, which manages core system functions and security boundaries. An attacker with low privileges and local access can exploit this race condition to elevate their privileges to higher levels, potentially SYSTEM or kernel-level privileges. The CVSS v3.1 base score is 7.0 (high), reflecting the vulnerability's significant impact on confidentiality, integrity, and availability, but also the high attack complexity and requirement for local privileges. No user interaction is needed, and the scope is unchanged, meaning the vulnerability affects only the local system. No known exploits have been reported in the wild as of the publication date (June 11, 2024). The vulnerability was reserved on March 22, 2024, and is publicly disclosed with enriched CISA data. The absence of patch links suggests that fixes may be pending or in progress. This vulnerability is critical for environments still running Windows 10 Version 1809, which, despite being an older release, remains in use in some enterprise and industrial systems.

Potential Impact

The exploitation of CVE-2024-30088 can lead to full system compromise by allowing attackers to elevate privileges from low-level user accounts to kernel or SYSTEM level. This can result in unauthorized access to sensitive data, modification or deletion of critical files, installation of persistent malware, and disruption of system availability. For European organizations, especially those in sectors such as government, finance, healthcare, and critical infrastructure, this vulnerability poses a significant risk. Legacy systems running Windows 10 Version 1809 may be targeted to bypass existing security controls. The high complexity of exploitation limits widespread attacks but does not eliminate targeted threat scenarios, including insider threats or attackers with initial footholds. The lack of known exploits currently provides a window for mitigation, but the potential impact on confidentiality, integrity, and availability is severe if exploited.

Mitigation Recommendations

1. Prioritize patching: Monitor Microsoft security advisories closely and apply official patches as soon as they become available for Windows 10 Version 1809 systems. 2. Limit local access: Restrict physical and remote local access to systems running the affected Windows version to trusted personnel only. 3. Employ application whitelisting and endpoint detection: Use advanced endpoint protection solutions to detect unusual privilege escalation attempts. 4. Upgrade systems: Plan and execute upgrades from Windows 10 Version 1809 to supported, fully patched Windows versions to reduce exposure to legacy vulnerabilities. 5. Harden system configurations: Disable unnecessary services and accounts that could be leveraged for local access. 6. Conduct regular audits: Review user privileges and system logs for signs of suspicious activity indicative of exploitation attempts. 7. Network segmentation: Isolate legacy systems to limit lateral movement in case of compromise. 8. Incident response readiness: Prepare and test incident response plans specifically addressing privilege escalation scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:15.570Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec10a

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 10/21/2025, 9:11:09 PM

Last updated: 12/4/2025, 6:38:13 AM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats