Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38050: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-38050cvecve-2024-38050cwe-191
Published: Tue Jul 09 2024 (07/09/2024, 17:03:13 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Workstation Service Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:35:47 UTC

Technical Analysis

CVE-2024-38050 is an integer underflow vulnerability (CWE-191) identified in the Microsoft Windows 10 Version 1809 Workstation Service. This flaw arises when an integer value unexpectedly wraps around due to improper handling of boundary conditions, potentially leading to memory corruption or logic errors. Specifically, the vulnerability allows an attacker with limited privileges and local access to elevate their privileges to higher system levels without requiring user interaction. The vulnerability has a CVSS 3.1 base score of 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and requiring only low privileges to exploit. The flaw does not require user interaction, increasing its risk profile. Although no public exploits are currently known, the vulnerability is publicly disclosed and could be targeted by attackers seeking to gain persistent control over affected systems. The affected product is Windows 10 Version 1809 (build 10.0.17763.0), which is still in use in certain environments, particularly those with legacy system dependencies or delayed patch cycles. The vulnerability was reserved in June 2024 and published in July 2024, with no patch links currently available, indicating that mitigation may rely on forthcoming updates or workarounds.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially in sectors where Windows 10 Version 1809 remains operational, such as government, healthcare, manufacturing, and critical infrastructure. Successful exploitation could allow attackers to bypass security controls, gain administrative privileges, and execute arbitrary code, potentially leading to data breaches, disruption of services, or deployment of ransomware and other malware. The impact on confidentiality, integrity, and availability is high, as attackers could access sensitive data, alter system configurations, or cause system outages. The requirement for local access limits remote exploitation but does not eliminate risk, as insider threats or compromised user accounts could be leveraged. The absence of user interaction requirement further increases the threat level. European organizations with legacy systems or delayed patching practices are particularly vulnerable, and the lack of current patches necessitates immediate attention to mitigate exposure.

Mitigation Recommendations

Organizations should immediately identify and inventory all systems running Windows 10 Version 1809 to assess exposure. Until official patches are released, restrict local access to affected systems by enforcing strict access controls, including limiting administrative privileges and using network segmentation to isolate vulnerable hosts. Employ endpoint detection and response (EDR) solutions to monitor for suspicious privilege escalation activities. Implement application whitelisting and least privilege principles to reduce the attack surface. Regularly review and update group policies to prevent unauthorized service modifications. Once Microsoft releases patches, prioritize their deployment through tested and controlled update processes. Additionally, conduct user awareness training to reduce insider threat risks and maintain robust backup and recovery procedures to mitigate potential ransomware or destructive attacks stemming from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:08:32.505Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb84a

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 2/11/2026, 10:35:47 AM

Last updated: 3/26/2026, 3:50:45 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses