Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37970: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-37970cvecve-2024-37970cwe-121
Published: Tue Jul 09 2024 (07/09/2024, 17:02:19 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:26:44 UTC

Technical Analysis

CVE-2024-37970 is a stack-based buffer overflow vulnerability classified under CWE-121, impacting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability relates to a Secure Boot security feature bypass, which is critical because Secure Boot is designed to ensure that only trusted software is loaded during the system startup process. A buffer overflow in this context could allow an attacker to overwrite memory on the stack, potentially leading to arbitrary code execution with elevated privileges. The CVSS 3.1 vector indicates the attack can be performed remotely (AV:A - adjacent network), requires low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no exploits are currently known in the wild, the vulnerability poses a serious risk due to the critical nature of Secure Boot in system security. The vulnerability was reserved in June 2024 and published in July 2024, with no patches currently linked, indicating that organizations must be vigilant and prepare for imminent updates. The lack of known exploits does not diminish the threat, as attackers may develop exploits quickly given the vulnerability’s nature and impact.

Potential Impact

For European organizations, the impact of CVE-2024-37970 is significant. Exploitation could lead to complete system compromise, allowing attackers to bypass Secure Boot protections and execute arbitrary code, potentially installing persistent malware or gaining control over critical systems. This could affect confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by causing system crashes or denial of service. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on Windows 10 Version 1809 are particularly vulnerable. The requirement for user interaction and network adjacency means phishing or local network attacks could be vectors. The absence of patches increases the window of exposure, raising the risk of targeted attacks. The vulnerability could also undermine trust in system security, complicating compliance with European data protection regulations like GDPR.

Mitigation Recommendations

1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported, patched version of Windows 10 or later, as Microsoft is unlikely to provide new patches for this legacy build. 2. Until upgrades are feasible, implement strict network segmentation and limit access to systems running the vulnerable OS, especially restricting adjacent network access. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual behavior indicative of exploitation attempts, such as anomalous memory usage or process execution. 4. Educate users to recognize and avoid social engineering attacks that could trigger the required user interaction for exploitation. 5. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 6. Monitor Microsoft security advisories closely for the release of patches or workarounds. 7. Use application whitelisting and Secure Boot configuration checks to detect and prevent unauthorized code execution. 8. Consider deploying network intrusion detection systems (NIDS) tuned to detect exploit attempts targeting this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.229Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb6e4

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 2/11/2026, 10:26:44 AM

Last updated: 3/23/2026, 2:30:03 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses