Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38048: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-38048cvecve-2024-38048cwe-125
Published: Tue Jul 09 2024 (07/09/2024, 17:03:12 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 10/14/2025, 23:13:47 UTC

Technical Analysis

CVE-2024-38048 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Network Driver Interface Specification (NDIS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an attacker to send specially crafted network packets that cause the NDIS driver to read memory outside of its intended bounds. This can lead to a system crash, resulting in a denial of service (DoS) condition. The vulnerability is exploitable remotely over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS v3.1 base score is 6.5, reflecting medium severity due to the impact on availability only, with no direct impact on confidentiality or integrity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN or similar means. The vulnerability was reserved in June 2024 and published in July 2024, with no known exploits in the wild or patches available at the time of analysis. The lack of patches means affected systems remain vulnerable until mitigations or upgrades are applied. The vulnerability primarily threatens systems still running the legacy Windows 10 1809 version, which is out of mainstream support but may still be in use in some enterprise or industrial environments. The NDIS component is critical for network communication, so exploitation can disrupt network connectivity and system stability, impacting business operations.

Potential Impact

For European organizations, the primary impact of CVE-2024-38048 is the potential for denial of service attacks that can disrupt network connectivity and cause system crashes on Windows 10 Version 1809 devices. This can affect availability of critical services, especially in sectors relying on legacy systems such as manufacturing, healthcare, and government infrastructure. Organizations with remote or local network access to vulnerable systems face risks of operational downtime, impacting productivity and potentially causing cascading effects in networked environments. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, service outages can lead to financial losses and reputational damage. The medium severity score reflects moderate risk, but the ease of exploitation without authentication and user interaction raises concern for environments where Windows 10 1809 remains in use. European enterprises with strict uptime requirements and regulatory obligations around service availability must prioritize mitigation to avoid disruptions. The absence of known exploits reduces immediate threat but does not eliminate future risk as attackers may develop exploits once the vulnerability details become widely known.

Mitigation Recommendations

1. Immediately identify and inventory all systems running Windows 10 Version 1809 (build 10.0.17763.0) within the organization. 2. Limit network exposure of vulnerable systems by implementing network segmentation and restricting access to trusted hosts only. 3. Deploy network-level filtering to block or monitor suspicious NDIS-related traffic patterns that could trigger the vulnerability. 4. Encourage migration to supported Windows versions (Windows 10 21H2 or later, or Windows 11) where this vulnerability is not present. 5. Apply any forthcoming security patches from Microsoft as soon as they become available. 6. Monitor network and system logs for unusual crashes or network anomalies indicative of exploitation attempts. 7. Use endpoint detection and response (EDR) tools to detect and respond to potential exploitation behaviors. 8. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving denial of service via network drivers. 9. For critical infrastructure, consider deploying redundant systems or failover mechanisms to maintain availability in case of an attack. 10. Coordinate with network providers and partners to ensure upstream filtering and awareness of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:08:32.505Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb828

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 10/14/2025, 11:13:47 PM

Last updated: 12/3/2025, 5:18:56 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats