Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37987: CWE-843: Access of Resource Using Incompatible Type ('Type Confusion') in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-37987cvecve-2024-37987cwe-843cwe-122
Published: Tue Jul 09 2024 (07/09/2024, 17:02:21 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Secure Boot Security Feature Bypass Vulnerability

AI-Powered Analysis

AILast updated: 10/14/2025, 23:06:45 UTC

Technical Analysis

CVE-2024-37987 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) characterized by a type confusion flaw (CWE-843) that enables an attacker to bypass the Secure Boot security feature. Secure Boot is a critical component of the Windows boot process designed to ensure that only trusted software is loaded during system startup, protecting against boot-level malware and rootkits. The vulnerability arises from improper handling of resource types within the Secure Boot implementation, allowing an attacker to access resources using incompatible types, which can lead to unauthorized code execution or security feature bypass. The CVSS 3.1 base score of 8.0 indicates a high-severity issue with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability's nature suggests that exploitation could allow attackers to circumvent Secure Boot protections, potentially leading to persistent and stealthy compromise of affected systems. The vulnerability was reserved on June 10, 2024, and published on July 9, 2024, with no patches currently linked, indicating that mitigation options may be limited until official updates are released.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly to those relying on Windows 10 Version 1809 in environments where Secure Boot is a critical security control, such as government, finance, healthcare, and critical infrastructure sectors. Exploitation could allow attackers to bypass Secure Boot protections, enabling the execution of unauthorized or malicious code during system startup, which can lead to persistent malware infections, data breaches, and system integrity violations. The high impact on confidentiality, integrity, and availability means that sensitive data could be exposed or altered, and systems could be rendered inoperable. Given the requirement for user interaction, phishing or social engineering campaigns could be used to trigger exploitation. The lack of known exploits currently provides a window for proactive defense, but the presence of a high-severity vulnerability in a widely used OS version necessitates urgent attention. Legacy systems that have not been upgraded or patched are particularly vulnerable, increasing the attack surface within European organizations.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available to remediate the vulnerability. 2. For environments where patching is delayed, restrict network access to vulnerable Windows 10 Version 1809 systems, especially from adjacent networks, to reduce exposure. 3. Implement strict user interaction policies and educate users to recognize and avoid phishing or social engineering attempts that could trigger exploitation. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect and block suspicious activities related to Secure Boot bypass attempts. 5. Consider upgrading affected systems to newer, supported Windows versions with improved security features and ongoing patch support. 6. Audit and enforce Secure Boot configurations and firmware integrity checks to detect anomalies. 7. Use network segmentation to isolate critical systems running vulnerable OS versions to limit lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-10T21:22:19.231Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb72c

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 10/14/2025, 11:06:45 PM

Last updated: 12/5/2025, 12:53:51 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats