Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38101: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-38101cvecve-2024-38101cwe-125
Published: Tue Jul 09 2024 (07/09/2024, 17:03:25 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:45:10 UTC

Technical Analysis

CVE-2024-38101 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Layer-2 Bridge Network Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw arises when the driver improperly handles certain network packets, allowing an attacker to trigger an out-of-bounds read condition. This memory access violation can cause the system to crash, resulting in a denial of service (DoS) condition. The vulnerability can be exploited remotely over the network without requiring any privileges or user interaction, which increases its risk profile. The CVSS 3.1 base score is 6.5, reflecting a medium severity level primarily due to the impact on availability (system crash) and the ease of remote exploitation. No known exploits have been reported in the wild, and no official patches have been released at the time of publication. The vulnerability affects only Windows 10 Version 1809, a legacy operating system version that is still in use in some environments. The Layer-2 Bridge Network Driver is responsible for network bridging functions, so environments utilizing network bridging or virtualization may be more exposed. The vulnerability does not affect confidentiality or integrity but can disrupt services by causing system instability or crashes.

Potential Impact

For European organizations, the primary impact of CVE-2024-38101 is the potential for denial of service attacks that can disrupt critical systems running Windows 10 Version 1809. This can lead to operational downtime, loss of productivity, and potential cascading effects in networked environments, especially where Layer-2 bridging or network virtualization is in use. Sectors such as manufacturing, telecommunications, and public services that rely on legacy Windows 10 systems may face increased risk. The lack of authentication or user interaction requirements means attackers can exploit this vulnerability remotely, increasing the attack surface. Although no data breach or integrity compromise is expected, the availability impact can affect business continuity and service delivery. Organizations with legacy infrastructure or those slow to upgrade may be disproportionately affected. The absence of known exploits provides a window for proactive mitigation, but the medium severity rating warrants timely attention to prevent potential disruptions.

Mitigation Recommendations

1. Prioritize upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version to eliminate exposure. 2. Implement network segmentation to isolate legacy systems, especially those performing network bridging functions, reducing exposure to untrusted networks. 3. Restrict network access to vulnerable systems by applying firewall rules and access control lists (ACLs) to limit incoming traffic to trusted sources only. 4. Monitor network traffic for unusual or malformed packets that could trigger the vulnerability, using intrusion detection/prevention systems (IDS/IPS) with updated signatures. 5. Apply virtual patching via network security devices if immediate OS upgrades are not feasible. 6. Maintain up-to-date backups and incident response plans to quickly recover from potential DoS incidents. 7. Stay informed on Microsoft advisories for the release of official patches and apply them promptly once available. 8. Conduct regular vulnerability assessments focusing on legacy systems to identify and remediate similar risks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.184Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb302

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 2/11/2026, 10:45:10 AM

Last updated: 3/27/2026, 10:14:16 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses