Skip to main content

CVE-2024-37984: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-37984cvecve-2024-37984cwe-121
Published: Tue Jul 09 2024 (07/09/2024, 17:03:01 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 07/05/2025, 20:43:13 UTC

Technical Analysis

CVE-2024-37984 is a high-severity stack-based buffer overflow vulnerability (CWE-121) identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability specifically affects the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system startup process. The flaw allows an attacker to bypass Secure Boot protections by exploiting a buffer overflow condition on the stack, potentially leading to arbitrary code execution with elevated privileges. The vulnerability does not require user interaction or prior authentication, and it can be exploited locally (AV:L) with low attack complexity (AC:L). The impact on confidentiality, integrity, and availability is rated as high, meaning an attacker could fully compromise the affected system, including executing malicious code, modifying system components, or causing system crashes. Although no known exploits are currently reported in the wild, the vulnerability's presence in a widely deployed OS version and its critical impact make it a significant threat. The lack of available patches at the time of publication increases the urgency for mitigation and risk management.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially for those still operating legacy or unpatched Windows 10 Version 1809 systems. Exploitation could lead to complete system compromise, allowing attackers to bypass Secure Boot protections, which are fundamental for maintaining system integrity and preventing unauthorized firmware or bootloader modifications. This could facilitate persistent malware infections, ransomware deployment, or espionage activities targeting sensitive data. Critical infrastructure, government agencies, financial institutions, and enterprises relying on Windows 10 1809 could face operational disruptions, data breaches, and compliance violations under GDPR due to unauthorized access or data loss. The local attack vector implies that attackers need some level of access to the system, but given the lack of required privileges or user interaction, insider threats or malware already present on the network could leverage this vulnerability to escalate privileges and evade security controls.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include restricting physical and local access to systems running Windows 10 Version 1809, enforcing strict endpoint security policies, and monitoring for unusual system behavior indicative of exploitation attempts. Organizations should prioritize upgrading affected systems to a supported and patched Windows version, ideally the latest Windows 10 or Windows 11 releases with Secure Boot improvements. Enabling additional security features such as virtualization-based security (VBS) and Credential Guard can help mitigate exploitation impact. Network segmentation and application whitelisting can reduce the attack surface. Regularly auditing Secure Boot configurations and firmware integrity can detect tampering attempts. Finally, organizations should maintain heightened monitoring and incident response readiness until patches are released and deployed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.231Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb711

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 7/5/2025, 8:43:13 PM

Last updated: 8/8/2025, 6:55:20 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats