CVE-2024-38048: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability
AI Analysis
Technical Summary
CVE-2024-38048 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Network Driver Interface Specification (NDIS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an attacker to send specially crafted network packets that cause the NDIS driver to read memory outside of its intended bounds. This can lead to a system crash, resulting in a denial of service (DoS) condition. The vulnerability is exploitable remotely over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS v3.1 base score is 6.5, reflecting medium severity due to the impact on availability only, with no direct impact on confidentiality or integrity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN or similar means. The vulnerability was reserved in June 2024 and published in July 2024, with no known exploits in the wild or patches available at the time of analysis. The lack of patches means affected systems remain vulnerable until mitigations or upgrades are applied. The vulnerability primarily threatens systems still running the legacy Windows 10 1809 version, which is out of mainstream support but may still be in use in some enterprise or industrial environments. The NDIS component is critical for network communication, so exploitation can disrupt network connectivity and system stability, impacting business operations.
Potential Impact
For European organizations, the primary impact of CVE-2024-38048 is the potential for denial of service attacks that can disrupt network connectivity and cause system crashes on Windows 10 Version 1809 devices. This can affect availability of critical services, especially in sectors relying on legacy systems such as manufacturing, healthcare, and government infrastructure. Organizations with remote or local network access to vulnerable systems face risks of operational downtime, impacting productivity and potentially causing cascading effects in networked environments. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, service outages can lead to financial losses and reputational damage. The medium severity score reflects moderate risk, but the ease of exploitation without authentication and user interaction raises concern for environments where Windows 10 1809 remains in use. European enterprises with strict uptime requirements and regulatory obligations around service availability must prioritize mitigation to avoid disruptions. The absence of known exploits reduces immediate threat but does not eliminate future risk as attackers may develop exploits once the vulnerability details become widely known.
Mitigation Recommendations
1. Immediately identify and inventory all systems running Windows 10 Version 1809 (build 10.0.17763.0) within the organization. 2. Limit network exposure of vulnerable systems by implementing network segmentation and restricting access to trusted hosts only. 3. Deploy network-level filtering to block or monitor suspicious NDIS-related traffic patterns that could trigger the vulnerability. 4. Encourage migration to supported Windows versions (Windows 10 21H2 or later, or Windows 11) where this vulnerability is not present. 5. Apply any forthcoming security patches from Microsoft as soon as they become available. 6. Monitor network and system logs for unusual crashes or network anomalies indicative of exploitation attempts. 7. Use endpoint detection and response (EDR) tools to detect and respond to potential exploitation behaviors. 8. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving denial of service via network drivers. 9. For critical infrastructure, consider deploying redundant systems or failover mechanisms to maintain availability in case of an attack. 10. Coordinate with network providers and partners to ensure upstream filtering and awareness of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2024-38048: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-38048 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Network Driver Interface Specification (NDIS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw allows an attacker to send specially crafted network packets that cause the NDIS driver to read memory outside of its intended bounds. This can lead to a system crash, resulting in a denial of service (DoS) condition. The vulnerability is exploitable remotely over the network without requiring any privileges or user interaction, increasing its risk profile. The CVSS v3.1 base score is 6.5, reflecting medium severity due to the impact on availability only, with no direct impact on confidentiality or integrity. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN or similar means. The vulnerability was reserved in June 2024 and published in July 2024, with no known exploits in the wild or patches available at the time of analysis. The lack of patches means affected systems remain vulnerable until mitigations or upgrades are applied. The vulnerability primarily threatens systems still running the legacy Windows 10 1809 version, which is out of mainstream support but may still be in use in some enterprise or industrial environments. The NDIS component is critical for network communication, so exploitation can disrupt network connectivity and system stability, impacting business operations.
Potential Impact
For European organizations, the primary impact of CVE-2024-38048 is the potential for denial of service attacks that can disrupt network connectivity and cause system crashes on Windows 10 Version 1809 devices. This can affect availability of critical services, especially in sectors relying on legacy systems such as manufacturing, healthcare, and government infrastructure. Organizations with remote or local network access to vulnerable systems face risks of operational downtime, impacting productivity and potentially causing cascading effects in networked environments. Since the vulnerability does not compromise confidentiality or integrity, data breaches are unlikely; however, service outages can lead to financial losses and reputational damage. The medium severity score reflects moderate risk, but the ease of exploitation without authentication and user interaction raises concern for environments where Windows 10 1809 remains in use. European enterprises with strict uptime requirements and regulatory obligations around service availability must prioritize mitigation to avoid disruptions. The absence of known exploits reduces immediate threat but does not eliminate future risk as attackers may develop exploits once the vulnerability details become widely known.
Mitigation Recommendations
1. Immediately identify and inventory all systems running Windows 10 Version 1809 (build 10.0.17763.0) within the organization. 2. Limit network exposure of vulnerable systems by implementing network segmentation and restricting access to trusted hosts only. 3. Deploy network-level filtering to block or monitor suspicious NDIS-related traffic patterns that could trigger the vulnerability. 4. Encourage migration to supported Windows versions (Windows 10 21H2 or later, or Windows 11) where this vulnerability is not present. 5. Apply any forthcoming security patches from Microsoft as soon as they become available. 6. Monitor network and system logs for unusual crashes or network anomalies indicative of exploitation attempts. 7. Use endpoint detection and response (EDR) tools to detect and respond to potential exploitation behaviors. 8. Educate IT staff about the vulnerability and ensure incident response plans include scenarios involving denial of service via network drivers. 9. For critical infrastructure, consider deploying redundant systems or failover mechanisms to maintain availability in case of an attack. 10. Coordinate with network providers and partners to ensure upstream filtering and awareness of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-06-11T22:08:32.505Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdb828
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 10/14/2025, 11:13:47 PM
Last updated: 12/3/2025, 5:18:56 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-44373: n/a
CriticalCVE-2025-65842: n/a
UnknownCVE-2025-65841: n/a
UnknownCVE-2025-34319: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TOTOLINK N300RT
CriticalCVE-2025-20389: The product does not validate or incorrectly validates input that can affect the control flow or data flow of a program. in Splunk Splunk Enterprise
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.