Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38062: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-38062cvecve-2024-38062cwe-125
Published: Tue Jul 09 2024 (07/09/2024, 17:02:31 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kernel-Mode Driver Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:38:51 UTC

Technical Analysis

CVE-2024-38062 is an out-of-bounds read vulnerability classified under CWE-125 found in a kernel-mode driver component of Microsoft Windows 10 Version 1809 (build 17763.0). This vulnerability allows an attacker with limited privileges (local access with low privileges) to read memory outside the intended bounds, which can lead to elevation of privilege (EoP). The flaw exists due to improper validation of memory boundaries in kernel-mode operations, enabling an attacker to potentially execute arbitrary code with kernel privileges or cause system instability. The vulnerability requires no user interaction and has low attack complexity but does require local access and some privileges. The impact includes full compromise of confidentiality, integrity, and availability of the affected system. Although no public exploits have been reported yet, the vulnerability is rated high severity with a CVSS 3.1 score of 7.8, reflecting the significant risk posed by successful exploitation. The vulnerability was reserved in June 2024 and published in July 2024, with no patches currently linked, indicating that organizations must monitor for updates and apply them promptly once released. The kernel-mode nature of the vulnerability makes it particularly dangerous as it can bypass many security controls and lead to complete system compromise.

Potential Impact

For European organizations, the impact of CVE-2024-38062 is substantial, especially for those still operating Windows 10 Version 1809 in production environments. Successful exploitation can lead to attackers gaining SYSTEM-level privileges, allowing them to install persistent malware, steal sensitive data, disrupt operations, or move laterally within networks. Critical infrastructure sectors such as finance, healthcare, energy, and government agencies are particularly at risk due to the potential for severe operational disruption and data breaches. The vulnerability's local attack vector means that attackers need some form of initial access, which could be achieved through phishing, compromised credentials, or insider threats. Given the high confidentiality, integrity, and availability impact, exploitation could result in significant financial losses, regulatory penalties under GDPR, and reputational damage. The lack of known exploits in the wild currently provides a window for proactive defense, but the risk remains high due to the vulnerability's nature and potential for weaponization.

Mitigation Recommendations

1. Prioritize upgrading or patching Windows 10 Version 1809 systems as soon as Microsoft releases a security update addressing CVE-2024-38062. 2. Until patches are available, restrict local access to vulnerable systems by enforcing strict access controls and network segmentation to limit potential attackers' ability to reach affected machines. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual kernel-mode activity or privilege escalation attempts. 4. Harden user privileges by applying the principle of least privilege and disabling unnecessary local accounts or services. 5. Conduct regular audits of systems running legacy Windows versions and plan migration to supported Windows versions to reduce exposure to unpatched vulnerabilities. 6. Implement multi-factor authentication (MFA) to reduce the risk of initial access through compromised credentials. 7. Educate users about phishing and social engineering to reduce the likelihood of attackers gaining initial footholds. 8. Monitor threat intelligence feeds and Microsoft advisories closely for updates on exploit availability and patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:08:32.508Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb8b9

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 2/11/2026, 10:38:51 AM

Last updated: 3/24/2026, 7:08:57 AM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses