CVE-2024-35270: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
CVE-2024-35270 is a medium severity denial of service vulnerability in the Windows iSCSI service affecting Windows 10 Version 1809 (build 10. 0. 17763. 0). It is caused by uncontrolled resource consumption (CWE-400) that can be triggered remotely without authentication or user interaction but requires high attack complexity. Exploitation results in denial of service by exhausting system resources, impacting availability but not confidentiality or integrity. No known exploits are currently reported in the wild. European organizations running legacy Windows 10 1809 systems with iSCSI enabled may face service disruptions. Mitigation involves applying available patches once released, disabling the iSCSI service if unused, and monitoring network traffic for anomalous iSCSI activity. Countries with higher usage of legacy Windows 10 systems in critical infrastructure and enterprises, such as Germany, France, and the UK, are more likely to be affected.
AI Analysis
Technical Summary
CVE-2024-35270 is a vulnerability identified in the Microsoft Windows iSCSI service on Windows 10 Version 1809 (build 10.0.17763.0). The flaw is categorized under CWE-400, indicating uncontrolled resource consumption. Specifically, the iSCSI service can be forced into a denial of service (DoS) state by an attacker who can remotely send crafted requests that cause the service to consume excessive system resources, such as memory or CPU cycles, leading to service degradation or system unavailability. The attack does not require any authentication or user interaction, but the attack complexity is high, meaning it is not trivial to exploit. The vulnerability affects only the availability aspect of the system’s security posture, with no impact on confidentiality or integrity. The CVSS v3.1 base score is 5.3, reflecting a medium severity level. No public exploits or active exploitation in the wild have been reported to date. The vulnerability was reserved in May 2024 and published in July 2024. Microsoft has not yet provided a patch link, indicating that remediation may still be pending or in progress. The iSCSI service is commonly used for storage networking, so environments utilizing iSCSI for SAN connectivity are at risk. The vulnerability’s presence in an older Windows 10 version (1809) suggests that systems not updated to newer versions remain vulnerable.
Potential Impact
For European organizations, the primary impact is service disruption due to denial of service conditions caused by resource exhaustion in the iSCSI service. This can affect availability of storage networks relying on iSCSI, potentially leading to downtime of critical applications and data access interruptions. Industries with heavy reliance on storage area networks, such as finance, healthcare, manufacturing, and public sector entities, could experience operational impacts. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, availability loss can indirectly affect business continuity and compliance with regulations like GDPR if critical services are interrupted. The medium severity and high attack complexity reduce the likelihood of widespread exploitation, but legacy systems still pose a risk. Organizations running Windows 10 1809 in production, especially those with iSCSI enabled and exposed to untrusted networks, are at higher risk.
Mitigation Recommendations
1. Apply Microsoft patches promptly once they become available for Windows 10 Version 1809 to remediate the vulnerability. 2. If patching is not immediately possible, consider disabling the iSCSI service on affected systems if it is not required for business operations. 3. Restrict network access to the iSCSI service by implementing firewall rules that limit incoming connections to trusted hosts and networks only. 4. Monitor network traffic for unusual or unexpected iSCSI requests that could indicate attempted exploitation. 5. Plan and execute an upgrade strategy to move legacy Windows 10 1809 systems to supported, updated versions of Windows 10 or Windows 11 to reduce exposure to known vulnerabilities. 6. Conduct regular vulnerability assessments and penetration testing focused on storage networking components to identify and remediate weaknesses. 7. Implement robust incident response procedures to quickly detect and mitigate denial of service conditions impacting storage services.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2024-35270: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809
Description
CVE-2024-35270 is a medium severity denial of service vulnerability in the Windows iSCSI service affecting Windows 10 Version 1809 (build 10. 0. 17763. 0). It is caused by uncontrolled resource consumption (CWE-400) that can be triggered remotely without authentication or user interaction but requires high attack complexity. Exploitation results in denial of service by exhausting system resources, impacting availability but not confidentiality or integrity. No known exploits are currently reported in the wild. European organizations running legacy Windows 10 1809 systems with iSCSI enabled may face service disruptions. Mitigation involves applying available patches once released, disabling the iSCSI service if unused, and monitoring network traffic for anomalous iSCSI activity. Countries with higher usage of legacy Windows 10 systems in critical infrastructure and enterprises, such as Germany, France, and the UK, are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2024-35270 is a vulnerability identified in the Microsoft Windows iSCSI service on Windows 10 Version 1809 (build 10.0.17763.0). The flaw is categorized under CWE-400, indicating uncontrolled resource consumption. Specifically, the iSCSI service can be forced into a denial of service (DoS) state by an attacker who can remotely send crafted requests that cause the service to consume excessive system resources, such as memory or CPU cycles, leading to service degradation or system unavailability. The attack does not require any authentication or user interaction, but the attack complexity is high, meaning it is not trivial to exploit. The vulnerability affects only the availability aspect of the system’s security posture, with no impact on confidentiality or integrity. The CVSS v3.1 base score is 5.3, reflecting a medium severity level. No public exploits or active exploitation in the wild have been reported to date. The vulnerability was reserved in May 2024 and published in July 2024. Microsoft has not yet provided a patch link, indicating that remediation may still be pending or in progress. The iSCSI service is commonly used for storage networking, so environments utilizing iSCSI for SAN connectivity are at risk. The vulnerability’s presence in an older Windows 10 version (1809) suggests that systems not updated to newer versions remain vulnerable.
Potential Impact
For European organizations, the primary impact is service disruption due to denial of service conditions caused by resource exhaustion in the iSCSI service. This can affect availability of storage networks relying on iSCSI, potentially leading to downtime of critical applications and data access interruptions. Industries with heavy reliance on storage area networks, such as finance, healthcare, manufacturing, and public sector entities, could experience operational impacts. Since the vulnerability does not affect confidentiality or integrity, data breaches or unauthorized data modification are not direct concerns. However, availability loss can indirectly affect business continuity and compliance with regulations like GDPR if critical services are interrupted. The medium severity and high attack complexity reduce the likelihood of widespread exploitation, but legacy systems still pose a risk. Organizations running Windows 10 1809 in production, especially those with iSCSI enabled and exposed to untrusted networks, are at higher risk.
Mitigation Recommendations
1. Apply Microsoft patches promptly once they become available for Windows 10 Version 1809 to remediate the vulnerability. 2. If patching is not immediately possible, consider disabling the iSCSI service on affected systems if it is not required for business operations. 3. Restrict network access to the iSCSI service by implementing firewall rules that limit incoming connections to trusted hosts and networks only. 4. Monitor network traffic for unusual or unexpected iSCSI requests that could indicate attempted exploitation. 5. Plan and execute an upgrade strategy to move legacy Windows 10 1809 systems to supported, updated versions of Windows 10 or Windows 11 to reduce exposure to known vulnerabilities. 6. Conduct regular vulnerability assessments and penetration testing focused on storage networking components to identify and remediate weaknesses. 7. Implement robust incident response procedures to quickly detect and mitigate denial of service conditions impacting storage services.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-05-14T20:14:47.414Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdb5e5
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 12/17/2025, 12:36:34 AM
Last updated: 1/19/2026, 9:49:28 AM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1148: Cross-Site Request Forgery in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2026-1147: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
Medium19th January – Threat Intelligence Report
MediumCVE-2026-1146: Cross Site Scripting in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-59355: CWE-532 Insertion of Sensitive Information into Log File in Apache Software Foundation Apache Linkis
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.