Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38031: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019

0
High
VulnerabilityCVE-2024-38031cvecve-2024-38031cwe-400
Published: Tue Jul 09 2024 (07/09/2024, 17:03:09 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:33:30 UTC

Technical Analysis

CVE-2024-38031 is a vulnerability in the Windows Online Certificate Status Protocol (OCSP) server component of Microsoft Windows Server 2019, specifically version 10.0.17763.0. The vulnerability is categorized as CWE-400, which involves uncontrolled resource consumption leading to denial of service (DoS). An unauthenticated attacker can remotely exploit this flaw without any user interaction or privileges by sending specially crafted requests to the OCSP server. This causes excessive resource consumption, such as CPU or memory exhaustion, resulting in service degradation or complete denial of service. The OCSP server is responsible for providing real-time certificate status information, critical for validating digital certificates in Public Key Infrastructure (PKI) environments. Disruption of OCSP services can lead to failures in certificate validation processes, impacting secure communications and authentication mechanisms. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges or user interaction required, and a significant impact on availability. No known exploits have been reported in the wild, and no patches have been published at the time of disclosure. Organizations using Windows Server 2019 for OCSP services should be aware of this vulnerability and prepare to apply updates once available.

Potential Impact

For European organizations, the primary impact of CVE-2024-38031 is the potential disruption of OCSP services, which are integral to PKI operations such as SSL/TLS certificate validation, client authentication, and secure email. A denial of service on the OCSP server can cause applications and services relying on real-time certificate status checks to fail or degrade, potentially leading to service outages or degraded security postures. Critical sectors such as finance, healthcare, government, and telecommunications that depend heavily on secure communications and authentication may experience operational interruptions. Additionally, organizations with internal PKI infrastructures using Windows Server 2019 OCSP responders could face internal service disruptions. The lack of confidentiality or integrity impact means data breaches or unauthorized data modifications are unlikely, but availability interruptions can have cascading effects on business continuity and trust in digital services.

Mitigation Recommendations

Until an official patch is released, European organizations should implement the following mitigations: 1) Restrict network access to the OCSP server by limiting inbound traffic to trusted IP addresses and networks using firewalls or network segmentation. 2) Monitor OCSP server resource utilization closely to detect abnormal spikes indicative of exploitation attempts. 3) Employ rate limiting or request throttling on the OCSP service to reduce the risk of resource exhaustion. 4) Consider deploying redundant OCSP responders or failover mechanisms to maintain availability during an attack. 5) Review and harden OCSP server configurations to minimize attack surface. 6) Stay informed on vendor advisories and apply security updates promptly once patches become available. 7) Incorporate this vulnerability into incident response and business continuity planning to prepare for potential service disruptions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T18:18:00.683Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb7e0

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 2/11/2026, 10:33:30 AM

Last updated: 3/26/2026, 10:29:45 AM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses