CVE-2024-35270: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Windows iSCSI Service Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2024-35270 is a medium-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is categorized under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial-of-service (DoS) condition. Specifically, this vulnerability exists in the Windows iSCSI (Internet Small Computer Systems Interface) service. The iSCSI service facilitates block-level access to storage devices over IP networks, commonly used in enterprise storage area networks (SANs). The vulnerability allows an unauthenticated attacker with network access (attack vector: adjacent network) to trigger excessive resource consumption in the iSCSI service, leading to a denial of service. The CVSS v3.1 base score is 5.3 (medium), with the vector indicating that the attack requires high attack complexity, no privileges, and no user interaction. The impact is limited to availability, with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in May 2024 and published in July 2024. Given the nature of the iSCSI service, exploitation could cause the affected Windows 10 systems to become unresponsive or crash, disrupting access to critical storage resources and potentially impacting business operations relying on these systems.
Potential Impact
For European organizations, especially those in sectors relying heavily on networked storage infrastructure—such as finance, healthcare, manufacturing, and public administration—the impact could be significant. Disruption of the iSCSI service could lead to loss of access to critical storage volumes, causing downtime for applications and services dependent on these storage resources. This could affect data availability and operational continuity. Since the vulnerability affects Windows 10 Version 1809, which is an older release, organizations still running legacy systems or devices may be particularly vulnerable. The denial-of-service condition could be leveraged in targeted attacks to disrupt business operations or as part of a multi-stage attack to create distractions. However, the requirement for high attack complexity and no known exploits reduce the immediate risk. Nonetheless, the potential for service disruption in critical infrastructure environments makes this vulnerability a concern for European enterprises.
Mitigation Recommendations
1. Prioritize upgrading or patching Windows 10 systems running Version 1809 to a supported and updated Windows version where this vulnerability is resolved. 2. If immediate upgrading is not feasible, restrict network access to the iSCSI service by implementing strict firewall rules limiting access to trusted hosts and networks only. 3. Monitor network traffic for unusual or excessive iSCSI requests that could indicate attempts to exploit this vulnerability. 4. Employ network segmentation to isolate systems running vulnerable Windows versions from critical infrastructure and sensitive data environments. 5. Disable the iSCSI service on systems where it is not required to reduce the attack surface. 6. Stay informed on official Microsoft advisories for patches or workarounds and apply them promptly once available. 7. Implement robust incident response plans to quickly detect and respond to denial-of-service conditions affecting storage services.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2024-35270: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
Windows iSCSI Service Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-35270 is a medium-severity vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). It is categorized under CWE-400, which relates to uncontrolled resource consumption, commonly known as a denial-of-service (DoS) condition. Specifically, this vulnerability exists in the Windows iSCSI (Internet Small Computer Systems Interface) service. The iSCSI service facilitates block-level access to storage devices over IP networks, commonly used in enterprise storage area networks (SANs). The vulnerability allows an unauthenticated attacker with network access (attack vector: adjacent network) to trigger excessive resource consumption in the iSCSI service, leading to a denial of service. The CVSS v3.1 base score is 5.3 (medium), with the vector indicating that the attack requires high attack complexity, no privileges, and no user interaction. The impact is limited to availability, with no confidentiality or integrity impact. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in May 2024 and published in July 2024. Given the nature of the iSCSI service, exploitation could cause the affected Windows 10 systems to become unresponsive or crash, disrupting access to critical storage resources and potentially impacting business operations relying on these systems.
Potential Impact
For European organizations, especially those in sectors relying heavily on networked storage infrastructure—such as finance, healthcare, manufacturing, and public administration—the impact could be significant. Disruption of the iSCSI service could lead to loss of access to critical storage volumes, causing downtime for applications and services dependent on these storage resources. This could affect data availability and operational continuity. Since the vulnerability affects Windows 10 Version 1809, which is an older release, organizations still running legacy systems or devices may be particularly vulnerable. The denial-of-service condition could be leveraged in targeted attacks to disrupt business operations or as part of a multi-stage attack to create distractions. However, the requirement for high attack complexity and no known exploits reduce the immediate risk. Nonetheless, the potential for service disruption in critical infrastructure environments makes this vulnerability a concern for European enterprises.
Mitigation Recommendations
1. Prioritize upgrading or patching Windows 10 systems running Version 1809 to a supported and updated Windows version where this vulnerability is resolved. 2. If immediate upgrading is not feasible, restrict network access to the iSCSI service by implementing strict firewall rules limiting access to trusted hosts and networks only. 3. Monitor network traffic for unusual or excessive iSCSI requests that could indicate attempts to exploit this vulnerability. 4. Employ network segmentation to isolate systems running vulnerable Windows versions from critical infrastructure and sensitive data environments. 5. Disable the iSCSI service on systems where it is not required to reduce the attack surface. 6. Stay informed on official Microsoft advisories for patches or workarounds and apply them promptly once available. 7. Implement robust incident response plans to quickly detect and respond to denial-of-service conditions affecting storage services.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-05-14T20:14:47.414Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdb5e5
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 7/6/2025, 9:42:50 PM
Last updated: 8/18/2025, 11:34:33 PM
Views: 15
Related Threats
CVE-2025-29366: n/a
UnknownCVE-2025-52094: n/a
UnknownCVE-2025-50733: n/a
UnknownCVE-2025-53363: CWE-73: External Control of File Name or Path in donknap dpanel
MediumCVE-2025-51605: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.