CVE-2024-37975: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809
Secure Boot Security Feature Bypass Vulnerability
AI Analysis
Technical Summary
CVE-2024-37975 is a vulnerability classified under CWE-191 (Integer Underflow) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system boot process. The vulnerability arises from an integer underflow condition, where a value unexpectedly wraps around to a very large number due to improper handling of arithmetic operations. This can lead to bypassing Secure Boot protections, allowing an attacker to load unauthorized or malicious code during system startup. The CVSS v3.1 score of 8.0 indicates a high severity, with an attack vector of 'Adjacent Network' (AV:A), meaning the attacker must be on the same local network segment. No privileges are required (PR:N), but user interaction is necessary (UI:R), such as convincing a user to connect to a malicious network or perform an action that triggers the exploit. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning a successful exploit could fully compromise the system. Currently, there are no known exploits in the wild and no official patches released, although the vulnerability is publicly disclosed and tracked by CISA. The lack of a patch increases the urgency for organizations to implement mitigations and consider upgrading to newer Windows versions that do not contain this flaw.
Potential Impact
For European organizations, the impact of CVE-2024-37975 is significant due to the potential for Secure Boot bypass, which undermines a critical security control designed to prevent unauthorized code execution during system startup. This can lead to persistent malware infections, rootkits, or complete system compromise, affecting confidentiality, integrity, and availability of sensitive data and critical systems. Industries relying on Windows 10 Version 1809, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators, face elevated risks. The requirement for adjacent network access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with shared networks or where social engineering can be leveraged. The absence of known exploits in the wild provides a window for proactive defense, but the high severity score demands immediate attention to prevent potential targeted attacks or future exploit development.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1809 to a supported and patched Windows version where this vulnerability is resolved. 2. Enforce strict network segmentation and limit access to local network segments to trusted devices only, reducing the attack surface for adjacent network exploits. 3. Disable legacy boot modes and ensure Secure Boot is properly configured and enforced on all endpoints. 4. Educate users about the risks of connecting to untrusted networks and the importance of avoiding suspicious prompts or actions that could trigger the exploit. 5. Monitor network traffic for unusual activity indicative of exploitation attempts, such as unauthorized bootloader modifications or unusual SMB/NetBIOS traffic. 6. Implement endpoint detection and response (EDR) solutions capable of detecting boot-level tampering or unauthorized code execution. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8. Stay informed on vendor advisories for patches or workarounds and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-37975: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809
Description
Secure Boot Security Feature Bypass Vulnerability
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-37975 is a vulnerability classified under CWE-191 (Integer Underflow) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system boot process. The vulnerability arises from an integer underflow condition, where a value unexpectedly wraps around to a very large number due to improper handling of arithmetic operations. This can lead to bypassing Secure Boot protections, allowing an attacker to load unauthorized or malicious code during system startup. The CVSS v3.1 score of 8.0 indicates a high severity, with an attack vector of 'Adjacent Network' (AV:A), meaning the attacker must be on the same local network segment. No privileges are required (PR:N), but user interaction is necessary (UI:R), such as convincing a user to connect to a malicious network or perform an action that triggers the exploit. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning a successful exploit could fully compromise the system. Currently, there are no known exploits in the wild and no official patches released, although the vulnerability is publicly disclosed and tracked by CISA. The lack of a patch increases the urgency for organizations to implement mitigations and consider upgrading to newer Windows versions that do not contain this flaw.
Potential Impact
For European organizations, the impact of CVE-2024-37975 is significant due to the potential for Secure Boot bypass, which undermines a critical security control designed to prevent unauthorized code execution during system startup. This can lead to persistent malware infections, rootkits, or complete system compromise, affecting confidentiality, integrity, and availability of sensitive data and critical systems. Industries relying on Windows 10 Version 1809, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators, face elevated risks. The requirement for adjacent network access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with shared networks or where social engineering can be leveraged. The absence of known exploits in the wild provides a window for proactive defense, but the high severity score demands immediate attention to prevent potential targeted attacks or future exploit development.
Mitigation Recommendations
1. Upgrade affected systems from Windows 10 Version 1809 to a supported and patched Windows version where this vulnerability is resolved. 2. Enforce strict network segmentation and limit access to local network segments to trusted devices only, reducing the attack surface for adjacent network exploits. 3. Disable legacy boot modes and ensure Secure Boot is properly configured and enforced on all endpoints. 4. Educate users about the risks of connecting to untrusted networks and the importance of avoiding suspicious prompts or actions that could trigger the exploit. 5. Monitor network traffic for unusual activity indicative of exploitation attempts, such as unauthorized bootloader modifications or unusual SMB/NetBIOS traffic. 6. Implement endpoint detection and response (EDR) solutions capable of detecting boot-level tampering or unauthorized code execution. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8. Stay informed on vendor advisories for patches or workarounds and apply them promptly once available.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-06-10T21:22:19.230Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981dc4522896dcbdb701
Added to database: 5/21/2025, 9:08:45 AM
Last enriched: 2/11/2026, 10:27:46 AM
Last updated: 3/26/2026, 7:41:45 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.