Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37975: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-37975cvecve-2024-37975cwe-191
Published: Tue Jul 09 2024 (07/09/2024, 17:03:00 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:27:46 UTC

Technical Analysis

CVE-2024-37975 is a vulnerability classified under CWE-191 (Integer Underflow) affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system boot process. The vulnerability arises from an integer underflow condition, where a value unexpectedly wraps around to a very large number due to improper handling of arithmetic operations. This can lead to bypassing Secure Boot protections, allowing an attacker to load unauthorized or malicious code during system startup. The CVSS v3.1 score of 8.0 indicates a high severity, with an attack vector of 'Adjacent Network' (AV:A), meaning the attacker must be on the same local network segment. No privileges are required (PR:N), but user interaction is necessary (UI:R), such as convincing a user to connect to a malicious network or perform an action that triggers the exploit. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning a successful exploit could fully compromise the system. Currently, there are no known exploits in the wild and no official patches released, although the vulnerability is publicly disclosed and tracked by CISA. The lack of a patch increases the urgency for organizations to implement mitigations and consider upgrading to newer Windows versions that do not contain this flaw.

Potential Impact

For European organizations, the impact of CVE-2024-37975 is significant due to the potential for Secure Boot bypass, which undermines a critical security control designed to prevent unauthorized code execution during system startup. This can lead to persistent malware infections, rootkits, or complete system compromise, affecting confidentiality, integrity, and availability of sensitive data and critical systems. Industries relying on Windows 10 Version 1809, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators, face elevated risks. The requirement for adjacent network access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments with shared networks or where social engineering can be leveraged. The absence of known exploits in the wild provides a window for proactive defense, but the high severity score demands immediate attention to prevent potential targeted attacks or future exploit development.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1809 to a supported and patched Windows version where this vulnerability is resolved. 2. Enforce strict network segmentation and limit access to local network segments to trusted devices only, reducing the attack surface for adjacent network exploits. 3. Disable legacy boot modes and ensure Secure Boot is properly configured and enforced on all endpoints. 4. Educate users about the risks of connecting to untrusted networks and the importance of avoiding suspicious prompts or actions that could trigger the exploit. 5. Monitor network traffic for unusual activity indicative of exploitation attempts, such as unauthorized bootloader modifications or unusual SMB/NetBIOS traffic. 6. Implement endpoint detection and response (EDR) solutions capable of detecting boot-level tampering or unauthorized code execution. 7. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8. Stay informed on vendor advisories for patches or workarounds and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.230Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb701

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 2/11/2026, 10:27:46 AM

Last updated: 3/26/2026, 7:41:45 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses