Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37984: CWE-121: Stack-based Buffer Overflow in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-37984cvecve-2024-37984cwe-121
Published: Tue Jul 09 2024 (07/09/2024, 17:03:01 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 10/14/2025, 23:05:54 UTC

Technical Analysis

CVE-2024-37984 is a stack-based buffer overflow vulnerability classified under CWE-121, impacting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability specifically targets the Secure Boot security feature, which is designed to ensure that only trusted software is loaded during the system startup process. By exploiting this buffer overflow, an attacker can bypass Secure Boot protections, potentially allowing execution of arbitrary code with system-level privileges. The CVSS 3.1 base score of 8.4 reflects high severity, with an attack vector requiring local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and no user interaction (UI:N). The vulnerability affects confidentiality, integrity, and availability (all rated high), indicating that exploitation could lead to full system compromise, including unauthorized code execution and system control. Although no public exploits are currently known, the vulnerability's nature and impact make it a critical concern for affected systems. The lack of available patches at the time of publication necessitates immediate risk mitigation through access controls and monitoring. This vulnerability is particularly dangerous because Secure Boot is a foundational security mechanism; bypassing it undermines the trustworthiness of the entire boot process and can facilitate persistent malware infections or rootkits.

Potential Impact

For European organizations, the impact of CVE-2024-37984 is significant, especially for those relying on Windows 10 Version 1809 in environments where Secure Boot is a critical security control. Successful exploitation could allow attackers to bypass Secure Boot protections, leading to unauthorized code execution at the highest privilege level. This can result in data breaches, system integrity violations, and denial of service. Critical infrastructure sectors such as energy, transportation, healthcare, and government agencies are particularly vulnerable due to their reliance on secure boot chains for system integrity. The vulnerability's local attack vector means that insider threats or attackers who gain physical or logical local access could exploit it. The absence of required privileges and user interaction lowers the barrier for exploitation once local access is obtained. This could facilitate lateral movement within networks or persistent footholds in sensitive environments. The potential for full system compromise also raises concerns about espionage, sabotage, and ransomware attacks targeting European entities.

Mitigation Recommendations

1. Apply official security patches from Microsoft immediately once they become available for Windows 10 Version 1809 to remediate the buffer overflow vulnerability. 2. Until patches are released, restrict local access to systems running the affected Windows version by enforcing strict physical security and limiting administrative access. 3. Implement enhanced monitoring and logging of Secure Boot processes and system boot events to detect anomalous behavior indicative of exploitation attempts. 4. Employ endpoint detection and response (EDR) solutions capable of identifying unusual code execution or privilege escalation activities related to Secure Boot bypass. 5. Consider upgrading affected systems to a supported and fully patched Windows version to reduce exposure to legacy vulnerabilities. 6. Conduct regular security audits and vulnerability assessments focusing on boot integrity and local privilege escalation vectors. 7. Educate IT staff and users about the risks of local access exploitation and enforce strong access control policies. 8. Use hardware-based security features such as TPM and secure firmware updates to strengthen boot process integrity.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.231Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb711

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 10/14/2025, 11:05:54 PM

Last updated: 12/3/2025, 10:10:23 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats