Skip to main content

CVE-2024-30096: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-30096cvecve-2024-30096cwe-200
Published: Tue Jun 11 2024 (06/11/2024, 17:00:00 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Cryptographic Services Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 17:59:50 UTC

Technical Analysis

CVE-2024-30096 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) affecting the Cryptographic Services component. This vulnerability is classified under CWE-200, which involves the exposure of sensitive information to unauthorized actors. Specifically, the flaw allows an attacker with limited privileges (requires low privileges and no user interaction) to gain unauthorized access to sensitive data handled by the Windows Cryptographic Services. The CVSS 3.1 base score is 5.5, indicating a moderate risk level. The attack vector is local (AV:L), meaning the attacker must have local access to the system, and the attack complexity is low (AC:L), so exploitation does not require special conditions. The vulnerability does not affect integrity or availability but impacts confidentiality with a high impact (C:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in March 2024 and published in June 2024. The exposure of sensitive cryptographic information could potentially lead to further attacks if leveraged in combination with other vulnerabilities or used to bypass security controls relying on cryptographic assurances.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems still running the outdated Windows 10 Version 1809, which is past mainstream support but may remain in use in some legacy or specialized environments. Exposure of sensitive cryptographic information could undermine data confidentiality, potentially allowing attackers to access encrypted data, authentication tokens, or cryptographic keys. This could facilitate lateral movement within networks, privilege escalation, or decryption of protected communications. Sectors with high reliance on cryptographic services, such as finance, healthcare, government, and critical infrastructure, are particularly at risk. The local attack vector limits remote exploitation, but insider threats or compromised endpoints could exploit this vulnerability. Given the lack of user interaction requirement, automated local attacks or malware with limited privileges could leverage this flaw. The impact on confidentiality could lead to regulatory compliance issues under GDPR and other data protection laws, especially if personal or sensitive data is exposed.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying systems running Windows 10 Version 1809 and plan for immediate patching once Microsoft releases an official update. In the interim, restrict local access to sensitive systems by enforcing strict access controls and monitoring for unusual local activity. Employ endpoint detection and response (EDR) solutions to detect suspicious processes or privilege escalations. Limit the use of legacy systems by upgrading to supported Windows versions that receive security updates. Additionally, implement strict network segmentation to contain potential breaches originating from compromised local accounts. Regularly audit cryptographic service usage and logs to detect anomalies. Educate users and administrators about the risks of local privilege misuse and enforce the principle of least privilege to minimize the attack surface. Finally, maintain up-to-date backups and incident response plans to quickly recover from any potential compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:15.572Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fa1484d88663aec123

Added to database: 5/20/2025, 6:59:06 PM

Last enriched: 7/4/2025, 5:59:50 PM

Last updated: 8/18/2025, 8:11:46 AM

Views: 19

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats