Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37975: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-37975cvecve-2024-37975cwe-191
Published: Tue Jul 09 2024 (07/09/2024, 17:03:00 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 10/14/2025, 23:04:48 UTC

Technical Analysis

CVE-2024-37975 is an integer underflow vulnerability classified under CWE-191 that affects the Secure Boot security feature in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). Secure Boot is a UEFI firmware feature that ensures only trusted software is loaded during the system boot process, protecting against rootkits and bootkits. The vulnerability arises from an integer underflow condition, which can cause wraparound behavior in internal calculations related to Secure Boot validation logic. This flaw can be exploited remotely (attack vector: adjacent network) without requiring privileges or authentication, although user interaction is necessary, possibly through crafted network packets or malicious media. Successful exploitation allows an attacker to bypass Secure Boot protections, potentially enabling unauthorized code execution early in the boot process, compromising system integrity, confidentiality, and availability. The CVSS v3.1 base score is 8.0 (high severity), reflecting the critical impact on system security and the relatively low complexity of exploitation. No patches or known exploits are currently available, but the vulnerability has been publicly disclosed and assigned a CVE identifier. The issue is particularly relevant for environments still running Windows 10 Version 1809, which is an older release with limited support, emphasizing the need for timely remediation.

Potential Impact

For European organizations, the impact of CVE-2024-37975 is significant due to the potential for Secure Boot bypass, which undermines the foundational trust model of system startup security. This can lead to persistent malware infections, rootkits, or bootkits that evade detection by traditional security tools, resulting in data breaches, system downtime, and loss of integrity in critical infrastructure. Sectors such as finance, healthcare, government, and critical infrastructure that rely on legacy Windows 10 systems are particularly vulnerable. The vulnerability's ability to affect confidentiality, integrity, and availability simultaneously increases the risk profile. Additionally, the requirement for only user interaction and no privileges lowers the barrier for attackers, potentially increasing the attack surface. Given the widespread use of Windows 10 in European enterprises and public sector organizations, the threat could have broad implications if exploited.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1809 to a supported and fully patched Windows version, such as Windows 10 Version 22H2 or Windows 11, to eliminate the vulnerability. 2. In the absence of an official patch, disable legacy or vulnerable Secure Boot configurations where feasible, or enforce stricter Secure Boot policies to reduce attack vectors. 3. Implement network segmentation and strict access controls to limit exposure to adjacent network attacks, especially for systems that must remain on Windows 10 Version 1809. 4. Conduct thorough audits of Secure Boot settings and firmware versions to ensure compliance with security best practices. 5. Monitor system logs and security telemetry for anomalies related to boot process integrity and unauthorized code execution attempts. 6. Educate users about the risks of interacting with untrusted media or network resources that could trigger exploitation. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises involving boot-level malware.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.230Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb701

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 10/14/2025, 11:04:48 PM

Last updated: 11/28/2025, 6:24:28 PM

Views: 32

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats