Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38064: CWE-908: Use of Uninitialized Resource in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-38064cvecve-2024-38064cwe-908
Published: Tue Jul 09 2024 (07/09/2024, 17:02:31 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows TCP/IP Information Disclosure Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:39:08 UTC

Technical Analysis

CVE-2024-38064 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) affecting the TCP/IP stack. The root cause is the use of an uninitialized resource within the TCP/IP implementation, categorized under CWE-908 (Use of Uninitialized Resource). This flaw can lead to information disclosure, where an attacker remotely sends crafted network packets to the vulnerable system and obtains sensitive information from memory that should not be accessible. The vulnerability does not require any privileges or user interaction, making it exploitable remotely over the network (Attack Vector: Network). The CVSS v3.1 base score is 7.5 (High), with a vector indicating no privileges required (PR:N), no user interaction (UI:N), and a high impact on confidentiality (C:H) but no impact on integrity or availability (I:N/A:N). Although no public exploits have been reported yet, the vulnerability poses a significant risk due to its ease of exploitation and potential to leak sensitive data. The vulnerability was reserved in June 2024 and published in July 2024. No patches are currently linked, suggesting that organizations must monitor for updates from Microsoft. The vulnerability is particularly relevant for environments still running Windows 10 Version 1809, which is an older but still in-use release in many enterprises. The TCP/IP stack is a critical component, so exploitation could expose network-related sensitive information, potentially aiding further attacks or reconnaissance.

Potential Impact

The primary impact of CVE-2024-38064 is the unauthorized disclosure of sensitive information from affected Windows 10 Version 1809 systems. For European organizations, this could lead to leakage of confidential network data, internal system information, or other sensitive details that attackers could leverage for further compromise or espionage. Sectors such as finance, healthcare, government, and critical infrastructure are particularly at risk due to the sensitivity of their data and the potential consequences of information leakage. Since the vulnerability can be exploited remotely without authentication or user interaction, attackers can scan and target vulnerable systems en masse, increasing the risk of widespread exposure. The lack of impact on integrity or availability means systems remain operational, potentially allowing prolonged undetected data leakage. Organizations relying on legacy Windows 10 1809 deployments, especially those with limited patch management or network segmentation, face higher exposure. The vulnerability could also facilitate advanced persistent threat (APT) actors in reconnaissance phases, particularly in geopolitically sensitive regions within Europe.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates as soon as they become available for Windows 10 Version 1809 systems. 2. If patching is delayed, implement network-level mitigations such as firewall rules to restrict unnecessary inbound TCP/IP traffic, especially from untrusted networks. 3. Employ network segmentation to isolate legacy Windows 10 1809 systems from critical assets and sensitive data repositories. 4. Use intrusion detection and prevention systems (IDS/IPS) with updated signatures to detect anomalous TCP/IP traffic patterns that may indicate exploitation attempts. 5. Conduct regular vulnerability scanning and asset inventory to identify and prioritize remediation of systems running the affected Windows version. 6. Consider upgrading legacy systems to supported Windows versions with active security updates to reduce exposure to known vulnerabilities. 7. Educate network administrators to recognize signs of information disclosure attacks and encourage prompt incident reporting. 8. Implement strict network access controls and limit exposure of vulnerable systems to the internet or untrusted networks. These steps go beyond generic advice by focusing on compensating controls and proactive monitoring tailored to the nature of this TCP/IP information disclosure vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:08:32.508Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb8c1

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 2/11/2026, 10:39:08 AM

Last updated: 3/24/2026, 7:04:12 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses