Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37971: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-37971cvecve-2024-37971cwe-121
Published: Tue Jul 09 2024 (07/09/2024, 17:02:58 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 10/14/2025, 23:03:33 UTC

Technical Analysis

CVE-2024-37971 is a stack-based buffer overflow vulnerability classified under CWE-121, found in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability specifically targets the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system boot process. By exploiting this buffer overflow, an attacker can bypass Secure Boot protections, potentially allowing execution of unauthorized code during system startup. The CVSS v3.1 score is 8.0 (high), reflecting the vulnerability's significant impact on confidentiality, integrity, and availability. The attack vector is adjacent (AV:A), meaning the attacker must have local network access or local user access, but no privileges are required (PR:N). User interaction is required (UI:R), indicating that the attacker needs to trick a user into performing some action to trigger the exploit. The scope is unchanged (S:U), so the impact is limited to the vulnerable component. No known exploits are currently in the wild, and no patches have been released yet. The vulnerability was reserved in June 2024 and published in July 2024. The absence of patches and the critical nature of Secure Boot make this vulnerability particularly concerning for environments relying on Windows 10 1809 for secure boot integrity.

Potential Impact

The vulnerability allows an attacker to bypass Secure Boot, undermining a fundamental security mechanism that protects systems from boot-level malware and rootkits. This can lead to unauthorized code execution with potentially elevated privileges, complete system compromise, and persistent malware infections that are difficult to detect or remove. For European organizations, especially those in critical infrastructure, government, finance, and healthcare sectors, this could result in severe data breaches, operational disruptions, and loss of trust. The requirement for user interaction and local access somewhat limits remote exploitation but does not eliminate risk in environments where users may be targeted with social engineering or malicious insiders exist. The lack of patches increases exposure time, and the high CVSS score indicates a significant threat to confidentiality, integrity, and availability of affected systems.

Mitigation Recommendations

1. Immediately identify and inventory all systems running Windows 10 Version 1809 (build 10.0.17763.0) within the organization. 2. Restrict local user access to sensitive systems and enforce strict user privilege management to minimize the risk of exploitation. 3. Educate users about the risks of social engineering and the need to avoid executing untrusted code or clicking suspicious links that could trigger the vulnerability. 4. Disable legacy boot modes and enforce Secure Boot policies via firmware settings to reduce attack surface. 5. Monitor system logs and security alerts for unusual activity related to boot processes or local user actions. 6. Prepare to deploy patches or updates from Microsoft as soon as they become available, and test them in controlled environments before wide deployment. 7. Consider upgrading affected systems to newer Windows versions that do not have this vulnerability. 8. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous behavior during boot or local user activity. 9. Implement network segmentation to limit lateral movement in case of compromise. 10. Regularly back up critical data and verify recovery procedures to mitigate impact of potential attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.229Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb6e6

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 10/14/2025, 11:03:33 PM

Last updated: 12/2/2025, 10:49:29 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats