Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38057: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-38057cvecve-2024-38057cwe-125
Published: Tue Jul 09 2024 (07/09/2024, 17:03:15 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 12/10/2025, 00:28:51 UTC

Technical Analysis

CVE-2024-38057 is a vulnerability classified under CWE-125 (Out-of-bounds Read) affecting the Kernel Streaming WOW Thunk Service Driver in Microsoft Windows 10 Version 1809 (build 17763.0). This vulnerability allows an attacker with limited privileges (local access) to read memory outside the intended buffer boundaries, which can lead to elevation of privilege by corrupting kernel memory or leaking sensitive information. The flaw resides in the kernel streaming component responsible for handling multimedia data streams, specifically in the WOW Thunk Service Driver, which bridges 32-bit and 64-bit code execution contexts. Exploitation does not require user interaction, making it easier for attackers who have already gained local access to escalate privileges to SYSTEM level. The CVSS 3.1 base score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and low privileges required. Although no public exploits are currently known, the vulnerability is critical due to its potential to enable attackers to bypass security boundaries and gain full control over affected systems. The lack of available patches at the time of publication necessitates immediate risk mitigation through access controls and monitoring. This vulnerability is particularly relevant for organizations still operating Windows 10 Version 1809, which is an older release but remains in use in some environments due to legacy application compatibility or delayed upgrade cycles.

Potential Impact

For European organizations, the impact of CVE-2024-38057 can be severe. Successful exploitation allows attackers to escalate privileges from a limited user account to SYSTEM level, effectively gaining full control over the affected machine. This can lead to unauthorized access to sensitive data, disruption of critical services, and the potential for deploying further malware or ransomware. Organizations in sectors such as finance, healthcare, manufacturing, and government, which may still rely on Windows 10 Version 1809 due to legacy dependencies, face increased risk of compromise. The vulnerability could facilitate lateral movement within networks, enabling attackers to compromise additional systems and exfiltrate data. Given the high confidentiality, integrity, and availability impacts, exploitation could result in significant operational disruption and regulatory compliance violations under GDPR. The absence of known exploits currently provides a window for proactive defense, but the risk remains high due to the ease of local exploitation and the critical nature of privilege escalation vulnerabilities.

Mitigation Recommendations

1. Apply official security patches from Microsoft immediately once they become available for Windows 10 Version 1809 to address CVE-2024-38057. 2. Until patches are released, restrict local access to affected systems by enforcing strict user account controls and limiting administrative privileges. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor and block suspicious activities related to kernel streaming components or privilege escalation attempts. 4. Conduct regular audits of user accounts and remove or disable unnecessary local accounts to reduce the attack surface. 5. Implement network segmentation to limit lateral movement opportunities if a system is compromised. 6. Educate IT staff and users about the risks of local privilege escalation vulnerabilities and the importance of timely patching. 7. Monitor system logs for unusual behavior indicative of exploitation attempts, such as unexpected access to kernel drivers or abnormal process activity. 8. Consider upgrading affected systems to a supported, more recent Windows version to reduce exposure to legacy vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:08:32.507Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb885

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 12/10/2025, 12:28:51 AM

Last updated: 1/19/2026, 10:15:42 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats