CVE-2024-37973: CWE-674: Uncontrolled Recursion in Microsoft Windows 10 Version 1809
Secure Boot Security Feature Bypass Vulnerability
AI Analysis
Technical Summary
CVE-2024-37973 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) that involves uncontrolled recursion, categorized under CWE-674. This flaw affects the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system startup process. The uncontrolled recursion can be triggered remotely without authentication or user interaction, leading to a security feature bypass. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability, all rated high. The flaw allows an attacker to bypass Secure Boot protections, potentially enabling the execution of unauthorized code during boot or compromising system integrity. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a critical concern for affected systems. The vulnerability was reserved in June 2024 and published in July 2024, with no patches currently listed, indicating that mitigation options may be limited until official updates are released. The vulnerability's exploitation could lead to persistent compromise at a low system level, undermining trust in the device's boot process and security assurances.
Potential Impact
For European organizations, the impact of CVE-2024-37973 is substantial due to the widespread use of Windows 10 Version 1809 in enterprise environments, especially in sectors with stringent security requirements such as finance, healthcare, and critical infrastructure. The Secure Boot bypass can allow attackers to load malicious bootloaders or kernel-level malware, leading to persistent and stealthy compromises that are difficult to detect and remediate. This can result in data breaches, system outages, and loss of trust in IT systems. The vulnerability's remote exploitability without authentication increases the attack surface, particularly in networked environments where adjacent network access is possible, such as corporate LANs or VPNs. European organizations with legacy systems still running Windows 10 1809 are at heightened risk, as upgrading to newer versions may not be immediate due to operational constraints. The potential for high-impact attacks targeting confidentiality, integrity, and availability makes this vulnerability a critical concern for maintaining compliance with European data protection regulations and cybersecurity directives.
Mitigation Recommendations
Given the absence of an official patch at the time of this analysis, European organizations should implement the following specific mitigations: 1) Conduct comprehensive asset inventories to identify all systems running Windows 10 Version 1809, prioritizing those with Secure Boot enabled. 2) Restrict network access to vulnerable systems by segmenting networks and applying strict firewall rules to limit adjacent network exposure. 3) Employ network intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous traffic patterns that could indicate exploitation attempts targeting Secure Boot processes. 4) Where feasible, accelerate migration plans to supported Windows versions with updated security patches and improved Secure Boot implementations. 5) Implement strict boot configuration policies and monitor Secure Boot logs for irregularities that may indicate exploitation attempts. 6) Educate IT staff on the vulnerability specifics to enhance incident response readiness. 7) Engage with Microsoft support channels to obtain early access to patches or workarounds as they become available. These targeted actions go beyond generic advice by focusing on network-level controls, system inventory accuracy, and proactive monitoring tailored to the vulnerability's characteristics.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2024-37973: CWE-674: Uncontrolled Recursion in Microsoft Windows 10 Version 1809
Description
Secure Boot Security Feature Bypass Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-37973 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) that involves uncontrolled recursion, categorized under CWE-674. This flaw affects the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system startup process. The uncontrolled recursion can be triggered remotely without authentication or user interaction, leading to a security feature bypass. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability, all rated high. The flaw allows an attacker to bypass Secure Boot protections, potentially enabling the execution of unauthorized code during boot or compromising system integrity. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a critical concern for affected systems. The vulnerability was reserved in June 2024 and published in July 2024, with no patches currently listed, indicating that mitigation options may be limited until official updates are released. The vulnerability's exploitation could lead to persistent compromise at a low system level, undermining trust in the device's boot process and security assurances.
Potential Impact
For European organizations, the impact of CVE-2024-37973 is substantial due to the widespread use of Windows 10 Version 1809 in enterprise environments, especially in sectors with stringent security requirements such as finance, healthcare, and critical infrastructure. The Secure Boot bypass can allow attackers to load malicious bootloaders or kernel-level malware, leading to persistent and stealthy compromises that are difficult to detect and remediate. This can result in data breaches, system outages, and loss of trust in IT systems. The vulnerability's remote exploitability without authentication increases the attack surface, particularly in networked environments where adjacent network access is possible, such as corporate LANs or VPNs. European organizations with legacy systems still running Windows 10 1809 are at heightened risk, as upgrading to newer versions may not be immediate due to operational constraints. The potential for high-impact attacks targeting confidentiality, integrity, and availability makes this vulnerability a critical concern for maintaining compliance with European data protection regulations and cybersecurity directives.
Mitigation Recommendations
Given the absence of an official patch at the time of this analysis, European organizations should implement the following specific mitigations: 1) Conduct comprehensive asset inventories to identify all systems running Windows 10 Version 1809, prioritizing those with Secure Boot enabled. 2) Restrict network access to vulnerable systems by segmenting networks and applying strict firewall rules to limit adjacent network exposure. 3) Employ network intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous traffic patterns that could indicate exploitation attempts targeting Secure Boot processes. 4) Where feasible, accelerate migration plans to supported Windows versions with updated security patches and improved Secure Boot implementations. 5) Implement strict boot configuration policies and monitor Secure Boot logs for irregularities that may indicate exploitation attempts. 6) Educate IT staff on the vulnerability specifics to enhance incident response readiness. 7) Engage with Microsoft support channels to obtain early access to patches or workarounds as they become available. These targeted actions go beyond generic advice by focusing on network-level controls, system inventory accuracy, and proactive monitoring tailored to the vulnerability's characteristics.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-06-10T21:22:19.229Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdb6f9
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 10/14/2025, 11:04:15 PM
Last updated: 12/2/2025, 5:20:24 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13606: CWE-352 Cross-Site Request Forgery (CSRF) in smackcoders Export All Posts, Products, Orders, Refunds & Users
MediumCVE-2025-13387: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in stellarwp Kadence WooCommerce Email Designer
HighCVE-2025-20792: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791T
UnknownCVE-2025-20791: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
UnknownCVE-2025-20790: CWE-476 NULL Pointer Dereference in MediaTek, Inc. MT2735, MT6833, MT6833P, MT6853, MT6853T, MT6855, MT6855T, MT6873, MT6875, MT6875T, MT6877, MT6877T, MT6877TT, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8675, MT8771, MT8791, MT8791T, MT8797
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.