Skip to main content

CVE-2024-35270: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-35270cvecve-2024-35270cwe-400
Published: Tue Jul 09 2024 (07/09/2024, 17:02:10 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows iSCSI Service Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 07/06/2025, 21:42:50 UTC

Technical Analysis

CVE-2024-35270 is a medium-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is categorized under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial-of-service (DoS) condition. Specifically, this vulnerability exists in the Windows iSCSI (Internet Small Computer Systems Interface) service. The iSCSI service facilitates block-level access to storage devices over IP networks, commonly used in enterprise storage area networks (SANs). The vulnerability allows an unauthenticated attacker with network access (attack vector: adjacent network) to trigger excessive resource consumption in the iSCSI service, leading to a denial of service. The CVSS v3.1 base score is 5.3 (medium), with the vector indicating that the attack requires high attack complexity, no privileges, and no user interaction. The impact is limited to availability, with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in May 2024 and published in July 2024. Given the nature of the iSCSI service, exploitation could cause the affected Windows 10 systems to become unresponsive or crash, disrupting access to critical storage resources and potentially impacting business operations relying on these systems.

Potential Impact

For European organizations, especially those in sectors relying heavily on networked storage infrastructure—such as finance, healthcare, manufacturing, and public administration—the impact could be significant. Disruption of the iSCSI service could lead to loss of access to critical storage volumes, causing downtime for applications and services dependent on these storage resources. This could affect data availability and operational continuity. Since the vulnerability affects Windows 10 Version 1809, which is an older release, organizations still running legacy systems or devices may be particularly vulnerable. The denial-of-service condition could be leveraged in targeted attacks to disrupt business operations or as part of a multi-stage attack to create distractions. However, the requirement for high attack complexity and no known exploits reduce the immediate risk. Nonetheless, the potential for service disruption in critical infrastructure environments makes this vulnerability a concern for European enterprises.

Mitigation Recommendations

1. Prioritize upgrading or patching Windows 10 systems running Version 1809 to a supported and updated Windows version where this vulnerability is resolved. 2. If immediate upgrading is not feasible, restrict network access to the iSCSI service by implementing strict firewall rules limiting access to trusted hosts and networks only. 3. Monitor network traffic for unusual or excessive iSCSI requests that could indicate attempts to exploit this vulnerability. 4. Employ network segmentation to isolate systems running vulnerable Windows versions from critical infrastructure and sensitive data environments. 5. Disable the iSCSI service on systems where it is not required to reduce the attack surface. 6. Stay informed on official Microsoft advisories for patches or workarounds and apply them promptly once available. 7. Implement robust incident response plans to quickly detect and respond to denial-of-service conditions affecting storage services.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-05-14T20:14:47.414Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb5e5

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/6/2025, 9:42:50 PM

Last updated: 8/18/2025, 11:34:33 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats