Skip to main content

CVE-2024-38049: CWE-73: External Control of File Name or Path in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-38049cvecve-2024-38049cwe-73
Published: Tue Jul 09 2024 (07/09/2024, 17:03:12 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Distributed Transaction Coordinator Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 07/06/2025, 21:55:59 UTC

Technical Analysis

CVE-2024-38049 is a vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Windows Distributed Transaction Coordinator (DTC) component. The vulnerability is classified under CWE-73, which pertains to External Control of File Name or Path. This type of vulnerability arises when an attacker can influence or control the file path or name used by the application, potentially leading to unauthorized file access or execution. In this case, the vulnerability allows for remote code execution (RCE) via the Windows DTC service. The CVSS 3.1 base score is 6.6, indicating a medium severity level. The vector string (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C) reveals that the attack vector is network-based (AV:N), but requires high attack complexity (AC:H) and high privileges (PR:H) on the targeted system, with no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The exploitability is currently unknown (E:U), and the remediation level is official (RL:O) with confirmed report confidence (RC:C). There are no known exploits in the wild at the time of publication. The vulnerability stems from improper handling of file paths in the DTC service, which could allow an attacker with elevated privileges to execute arbitrary code remotely by controlling file names or paths used by the service. This could lead to full system compromise if exploited successfully. The affected version is Windows 10 Version 1809 (build 10.0.17763.0), which is an older release of Windows 10, but still in use in some environments. No patch links are provided yet, indicating that remediation may be pending or in progress.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to systems still running Windows 10 Version 1809, which may be found in legacy environments or specialized industrial systems. Successful exploitation could lead to remote code execution with high impact on confidentiality, integrity, and availability of affected systems. This could result in unauthorized data access, data manipulation, or disruption of critical services. Organizations in sectors such as finance, healthcare, manufacturing, and government could be particularly affected due to their reliance on Windows infrastructure and the critical nature of their operations. The requirement for high privileges and high attack complexity somewhat limits the immediate risk, but insider threats or attackers who have already gained elevated access could leverage this vulnerability to escalate their control and move laterally within networks. The lack of user interaction needed means that once conditions are met, exploitation could be automated or triggered without user awareness. Given the widespread use of Windows in European enterprises, the potential impact is considerable, especially in environments where patching is delayed or where legacy systems remain operational.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying all systems running Windows 10 Version 1809, especially those using the Distributed Transaction Coordinator service. Since no official patches are linked yet, organizations should monitor Microsoft security advisories closely for updates and apply patches immediately upon release. In the interim, organizations can mitigate risk by restricting network access to the DTC service, employing network segmentation to isolate vulnerable systems, and enforcing strict access controls to limit users with high privileges. Implementing application whitelisting and endpoint detection and response (EDR) solutions can help detect and prevent exploitation attempts. Additionally, organizations should review and harden configurations related to file path handling in DTC if possible, and conduct regular audits for unusual activities or privilege escalations. Ensuring that systems are upgraded to supported and patched Windows versions will reduce exposure to this and similar vulnerabilities over time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:08:32.505Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb82e

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 7/6/2025, 9:55:59 PM

Last updated: 7/31/2025, 8:12:59 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats