Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38048: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-38048cvecve-2024-38048cwe-125
Published: Tue Jul 09 2024 (07/09/2024, 17:03:12 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 12/10/2025, 00:26:36 UTC

Technical Analysis

CVE-2024-38048 is a medium-severity vulnerability identified in the Windows Network Driver Interface Specification (NDIS) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified as CWE-125, an out-of-bounds read, which occurs when the NDIS component improperly handles certain network packets or inputs, leading to reading memory outside the intended buffer boundaries. This flaw can be triggered remotely by an unauthenticated attacker without any user interaction, exploiting the network interface to cause the system to crash, resulting in a denial of service (DoS) condition. The CVSS v3.1 base score is 6.5, with vector AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating that the attack requires adjacent network access (local network), low attack complexity, no privileges or user interaction, and impacts availability only. No known exploits are currently reported in the wild, and no official patches have been released as of the publication date (July 9, 2024). The vulnerability affects legacy Windows 10 1809 systems, which are out of mainstream support but may still be in use in some enterprise environments. The technical root cause is an out-of-bounds read in NDIS, which can cause system instability or crashes when processing maliciously crafted network traffic. This vulnerability does not allow data leakage or code execution but can disrupt network operations and system availability.

Potential Impact

For European organizations, the primary impact of CVE-2024-38048 is the potential for denial of service attacks that can disrupt critical network infrastructure and services running on Windows 10 Version 1809 systems. This can affect availability of servers, workstations, and network devices relying on vulnerable NDIS components, leading to operational downtime and potential loss of productivity. Sectors such as finance, healthcare, manufacturing, and government agencies that still operate legacy Windows 10 1809 systems are particularly at risk. The inability to maintain network availability can also impact compliance with regulations like GDPR if service disruptions affect data processing or availability. Although the vulnerability does not compromise confidentiality or integrity, the disruption of services can have cascading effects on business continuity and incident response capabilities. The lack of known exploits reduces immediate risk, but the ease of exploitation and remote attack vector means attackers could develop exploits rapidly once details are widely known.

Mitigation Recommendations

1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version to eliminate the vulnerability. 2. Until upgrades are possible, implement network segmentation to isolate legacy systems and limit exposure to untrusted networks. 3. Restrict or disable unnecessary network protocols and services that interact with NDIS to reduce the attack surface. 4. Monitor network traffic for anomalous patterns that could indicate attempts to exploit this vulnerability, using intrusion detection/prevention systems tuned for NDIS-related anomalies. 5. Apply any interim mitigations or workarounds recommended by Microsoft once available, including registry or configuration changes to harden NDIS behavior. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents. 7. Educate IT staff about the vulnerability and ensure rapid deployment of patches when released. 8. Collaborate with network and security teams to enforce strict access controls on local networks where vulnerable systems reside.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:08:32.505Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb828

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 12/10/2025, 12:26:36 AM

Last updated: 1/18/2026, 2:46:13 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats