Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35270: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-35270cvecve-2024-35270cwe-400
Published: Tue Jul 09 2024 (07/09/2024, 17:02:10 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows iSCSI Service Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 10/14/2025, 22:24:59 UTC

Technical Analysis

CVE-2024-35270 is a vulnerability identified in the Microsoft Windows 10 Version 1809 iSCSI service, categorized under CWE-400 for uncontrolled resource consumption. The iSCSI service facilitates block-level access to storage devices over IP networks, commonly used in enterprise environments for storage area networks (SANs). This vulnerability allows a remote attacker to send specially crafted network packets to the iSCSI service, causing it to consume excessive system resources such as memory or CPU cycles. The result is a denial of service (DoS) condition where the affected system becomes unresponsive or crashes, impacting availability. The CVSS 3.1 base score is 5.3 (medium severity), with the vector indicating that the attack requires network access (AV:A), high attack complexity (AC:H), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), and the impact is limited to availability (A:H) without affecting confidentiality or integrity. No public exploits have been reported yet, and no patches are currently linked, suggesting the vulnerability is newly disclosed. The vulnerability was reserved in May 2024 and published in July 2024. Given the nature of iSCSI's role in enterprise storage, exploitation could disrupt critical storage access, leading to operational downtime.

Potential Impact

For European organizations, the primary impact is on system availability, particularly for those relying on Windows 10 Version 1809 systems with iSCSI services enabled. Enterprises using iSCSI for storage in data centers, cloud providers, and critical infrastructure sectors such as finance, healthcare, and manufacturing could experience service interruptions or outages if exploited. The denial of service could lead to downtime, loss of productivity, and potential cascading failures in dependent systems. Since the vulnerability does not affect confidentiality or integrity, data breaches are less likely, but operational disruption can have significant business and reputational consequences. Organizations that have not upgraded from Windows 10 1809 or maintain legacy systems are at higher risk. The lack of known exploits reduces immediate threat but also means organizations should proactively prepare for potential future attacks.

Mitigation Recommendations

Organizations should prioritize patching Windows 10 Version 1809 systems once Microsoft releases an official update addressing CVE-2024-35270. Until patches are available, network-level mitigations should be implemented, including restricting access to the iSCSI service to trusted hosts only via firewall rules and network segmentation. Monitoring network traffic for unusual or malformed iSCSI packets can help detect attempted exploitation. Disabling the iSCSI service on systems where it is not required reduces the attack surface. Additionally, organizations should consider upgrading to supported Windows versions with ongoing security updates to avoid legacy vulnerabilities. Incident response plans should include procedures for detecting and mitigating denial of service conditions related to iSCSI. Regular backups and redundancy in storage infrastructure can minimize operational impact if service disruption occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-05-14T20:14:47.414Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb5e5

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 10/14/2025, 10:24:59 PM

Last updated: 10/16/2025, 12:49:18 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats