Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38080: CWE-190: Integer Overflow or Wraparound in Microsoft Windows Server 2022

0
High
VulnerabilityCVE-2024-38080cvecve-2024-38080cwe-190
Published: Tue Jul 09 2024 (07/09/2024, 17:02:34 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2022

Description

Windows Hyper-V Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 10/21/2025, 23:55:48 UTC

Technical Analysis

CVE-2024-38080 is a vulnerability identified in Microsoft Windows Server 2022, specifically within the Hyper-V virtualization component. It is classified under CWE-190, which refers to integer overflow or wraparound issues. This vulnerability arises when an integer value exceeds its maximum limit and wraps around, potentially causing incorrect logic or memory corruption. In this case, the flaw allows an attacker with limited privileges and local access to exploit the integer overflow to elevate their privileges on the system. The vulnerability does not require user interaction, making it more dangerous in environments where local access is possible. The CVSS 3.1 base score of 7.8 indicates a high severity, with attack vector being local (AV:L), low attack complexity (AC:L), requiring low privileges (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is rated high (C:H/I:H/A:H), meaning successful exploitation could lead to full system compromise. Although no known exploits are currently reported in the wild, the vulnerability's presence in a critical virtualization component like Hyper-V makes it a significant risk for enterprise environments relying on Windows Server 2022 for virtual machine hosting and management. The affected version is 10.0.20348.0, and the vulnerability was publicly disclosed on July 9, 2024. The lack of available patches at the time of disclosure necessitates immediate attention to mitigate risk through alternative controls until updates are released.

Potential Impact

The vulnerability allows an attacker with limited local privileges to escalate to higher privileges, potentially gaining administrative control over the Windows Server 2022 system. This can lead to unauthorized access to sensitive data, manipulation or destruction of virtual machines, and disruption of critical services hosted on the affected servers. For European organizations, especially those operating data centers, cloud services, or critical infrastructure relying on Hyper-V virtualization, the impact includes potential breaches of confidentiality, integrity, and availability of business-critical systems. This could result in data loss, service outages, regulatory non-compliance (e.g., GDPR violations), and reputational damage. The high severity and broad impact on system security make this vulnerability a significant threat to enterprise environments. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future exploitation, especially by sophisticated threat actors targeting European organizations.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply official patches or updates for Windows Server 2022 Hyper-V as soon as they become available. 2. Restrict local access to Windows Server 2022 hosts running Hyper-V to trusted administrators only, minimizing the attack surface. 3. Implement strict access controls and auditing on Hyper-V hosts to detect and respond to suspicious privilege escalation attempts. 4. Use endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts. 5. Consider isolating Hyper-V hosts in segmented network zones to limit lateral movement in case of compromise. 6. Review and harden virtualization host configurations according to Microsoft best practices to reduce exposure. 7. Educate system administrators about the vulnerability and the importance of timely patching and monitoring. 8. If patching is delayed, consider temporary mitigations such as disabling unnecessary Hyper-V features or services that could be exploited.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.182Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb939

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 10/21/2025, 11:55:48 PM

Last updated: 12/5/2025, 12:37:02 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats