Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37974: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-37974cvecve-2024-37974cwe-191
Published: Tue Jul 09 2024 (07/09/2024, 17:02:19 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 12/10/2025, 00:17:38 UTC

Technical Analysis

CVE-2024-37974 is a vulnerability classified under CWE-191 (Integer Underflow) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw involves an integer underflow condition that can be exploited to bypass the Secure Boot security feature. Secure Boot is a critical security mechanism designed to ensure that only trusted software is loaded during the system startup process, preventing rootkits and bootkits. An integer underflow in this context means that a calculation involving integer values wraps around unexpectedly, potentially allowing an attacker to manipulate the logic that enforces Secure Boot policies. The CVSS 3.1 base score is 8.0 (high severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), but user interaction is needed (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker could remotely trigger the vulnerability with user interaction to bypass Secure Boot protections, potentially leading to execution of unauthorized code at boot time, compromising system integrity and confidentiality. No public exploit code or active exploitation in the wild has been reported yet. The vulnerability was reserved in June 2024 and published in July 2024. No patch links are currently provided, indicating that organizations should monitor Microsoft advisories closely for updates.

Potential Impact

For European organizations, the impact of CVE-2024-37974 is significant due to the widespread use of Windows 10 Version 1809 in enterprise environments, especially in sectors relying on Secure Boot for endpoint security such as government, finance, healthcare, and critical infrastructure. Successful exploitation could allow attackers to bypass Secure Boot protections, enabling persistent malware infections at the boot level, which are difficult to detect and remove. This compromises system integrity and confidentiality, potentially leading to data breaches, espionage, or disruption of critical services. The requirement for user interaction and adjacent network access somewhat limits the attack surface but does not eliminate risk, especially in environments where phishing or social engineering can induce user actions. The lack of known exploits in the wild provides a window for proactive defense, but the high severity score underscores the urgency of mitigation. Organizations with legacy systems or delayed patch management practices are particularly vulnerable.

Mitigation Recommendations

1. Immediately verify if Windows 10 Version 1809 systems are in use and prioritize their inventory. 2. Monitor Microsoft security advisories for the release of patches or workarounds addressing CVE-2024-37974 and apply them promptly. 3. If patches are unavailable, consider upgrading affected systems to a supported and patched Windows version to eliminate exposure. 4. Review and enforce Secure Boot configurations in BIOS/UEFI settings to ensure they are enabled and properly configured. 5. Implement network segmentation to limit adjacent network access to vulnerable systems, reducing the attack vector. 6. Enhance user awareness training to reduce the likelihood of user interaction that could trigger exploitation. 7. Deploy endpoint detection and response (EDR) solutions capable of detecting boot-level anomalies and unauthorized code execution. 8. Regularly audit system integrity and perform boot-time security checks to detect potential compromises early. 9. Establish incident response plans specifically addressing boot-level compromises and Secure Boot bypass scenarios. 10. Collaborate with vendors and cybersecurity communities to share threat intelligence and mitigation strategies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.229Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb6fd

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 12/10/2025, 12:17:38 AM

Last updated: 1/18/2026, 12:02:21 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats