Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38074: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows Server 2019

0
Critical
VulnerabilityCVE-2024-38074cvecve-2024-38074cwe-191
Published: Tue Jul 09 2024 (07/09/2024, 17:03:20 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:42:20 UTC

Technical Analysis

CVE-2024-38074 is an integer underflow vulnerability (CWE-191) identified in the Windows Remote Desktop Licensing Service component of Microsoft Windows Server 2019, specifically version 10.0.17763.0. The flaw arises from improper handling of integer values, which can cause wraparound behavior leading to memory corruption. This memory corruption can be exploited remotely without authentication or user interaction, enabling an attacker to execute arbitrary code on the affected server. The vulnerability affects the Remote Desktop Licensing Service, a critical component responsible for managing licenses for Remote Desktop Services, which is commonly used in enterprise environments to provide remote access to Windows desktops and applications. The CVSS v3.1 base score of 9.8 reflects the vulnerability's critical nature, with network attack vector (AV:N), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the ease of exploitation and the critical impact make this a high-priority vulnerability for patching. The vulnerability was reserved in June 2024 and published in July 2024, with no patches currently linked, indicating that organizations should monitor for updates and apply them promptly once available.

Potential Impact

The exploitation of CVE-2024-38074 could lead to full system compromise of Windows Server 2019 machines running the vulnerable Remote Desktop Licensing Service. This would allow attackers to execute arbitrary code remotely, potentially leading to unauthorized access to sensitive data, disruption of remote desktop services, and lateral movement within enterprise networks. For European organizations, this could result in significant operational downtime, data breaches involving personal and corporate information, and compliance violations under regulations such as GDPR. Critical infrastructure, government agencies, financial institutions, and large enterprises that rely heavily on Windows Server 2019 for remote access are particularly at risk. The vulnerability's ability to be exploited without authentication and user interaction increases the likelihood of automated attacks and wormable scenarios, which could rapidly propagate across vulnerable networks in Europe, amplifying the impact.

Mitigation Recommendations

Organizations should immediately inventory their Windows Server 2019 deployments to identify systems running version 10.0.17763.0 with the Remote Desktop Licensing Service enabled. Until official patches are released, network-level mitigations should be implemented, including restricting inbound access to the Remote Desktop Licensing Service ports (typically TCP 135 and related RPC ports) using firewalls and network segmentation. Employing intrusion detection/prevention systems (IDS/IPS) with updated signatures to detect anomalous Remote Desktop Licensing Service traffic can help identify exploitation attempts. Administrators should disable or uninstall the Remote Desktop Licensing Service if it is not required. Additionally, applying the principle of least privilege to service accounts and ensuring robust monitoring and logging of Remote Desktop Services activity will aid in early detection of exploitation attempts. Once Microsoft releases a patch, it should be applied promptly and tested in staging environments before deployment to production.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.181Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb916

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 2/11/2026, 10:42:20 AM

Last updated: 3/26/2026, 3:52:16 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses