Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37973: CWE-674: Uncontrolled Recursion in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-37973cvecve-2024-37973cwe-674
Published: Tue Jul 09 2024 (07/09/2024, 17:02:59 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 10/14/2025, 23:04:15 UTC

Technical Analysis

CVE-2024-37973 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) that involves uncontrolled recursion, categorized under CWE-674. This flaw affects the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system startup process. The uncontrolled recursion can be triggered remotely without authentication or user interaction, leading to a security feature bypass. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability, all rated high. The flaw allows an attacker to bypass Secure Boot protections, potentially enabling the execution of unauthorized code during boot or compromising system integrity. Although no public exploits have been reported yet, the vulnerability's nature and severity make it a critical concern for affected systems. The vulnerability was reserved in June 2024 and published in July 2024, with no patches currently listed, indicating that mitigation options may be limited until official updates are released. The vulnerability's exploitation could lead to persistent compromise at a low system level, undermining trust in the device's boot process and security assurances.

Potential Impact

For European organizations, the impact of CVE-2024-37973 is substantial due to the widespread use of Windows 10 Version 1809 in enterprise environments, especially in sectors with stringent security requirements such as finance, healthcare, and critical infrastructure. The Secure Boot bypass can allow attackers to load malicious bootloaders or kernel-level malware, leading to persistent and stealthy compromises that are difficult to detect and remediate. This can result in data breaches, system outages, and loss of trust in IT systems. The vulnerability's remote exploitability without authentication increases the attack surface, particularly in networked environments where adjacent network access is possible, such as corporate LANs or VPNs. European organizations with legacy systems still running Windows 10 1809 are at heightened risk, as upgrading to newer versions may not be immediate due to operational constraints. The potential for high-impact attacks targeting confidentiality, integrity, and availability makes this vulnerability a critical concern for maintaining compliance with European data protection regulations and cybersecurity directives.

Mitigation Recommendations

Given the absence of an official patch at the time of this analysis, European organizations should implement the following specific mitigations: 1) Conduct comprehensive asset inventories to identify all systems running Windows 10 Version 1809, prioritizing those with Secure Boot enabled. 2) Restrict network access to vulnerable systems by segmenting networks and applying strict firewall rules to limit adjacent network exposure. 3) Employ network intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous traffic patterns that could indicate exploitation attempts targeting Secure Boot processes. 4) Where feasible, accelerate migration plans to supported Windows versions with updated security patches and improved Secure Boot implementations. 5) Implement strict boot configuration policies and monitor Secure Boot logs for irregularities that may indicate exploitation attempts. 6) Educate IT staff on the vulnerability specifics to enhance incident response readiness. 7) Engage with Microsoft support channels to obtain early access to patches or workarounds as they become available. These targeted actions go beyond generic advice by focusing on network-level controls, system inventory accuracy, and proactive monitoring tailored to the vulnerability's characteristics.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.229Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb6f9

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 10/14/2025, 11:04:15 PM

Last updated: 12/2/2025, 5:20:24 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats