Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38102: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-38102cvecve-2024-38102cwe-125
Published: Tue Jul 09 2024 (07/09/2024, 17:02:37 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 12/10/2025, 00:37:32 UTC

Technical Analysis

CVE-2024-38102 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in the Windows Layer-2 Bridge Network Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability arises from improper bounds checking when processing network packets related to the Layer-2 bridging functionality, which allows an attacker with adjacent network access to trigger an out-of-bounds read condition. This flaw can cause the system to crash, resulting in a denial of service (DoS) condition. The vulnerability does not require any privileges, authentication, or user interaction, making it easier to exploit in environments where an attacker can send crafted packets on the same network segment. The CVSS 3.1 base score is 6.5, reflecting a medium severity level primarily due to the DoS impact and the attack vector being local network access. No public exploits or active exploitation in the wild have been reported as of the publication date. The vulnerability affects only the specific Windows 10 1809 build, which is an older version of Windows 10, and no patch links have been provided yet, indicating that a fix may still be pending or in development. The Layer-2 Bridge Network Driver is used to bridge network interfaces at the data link layer, commonly in virtualized or complex network environments, which may increase the attack surface in enterprise settings.

Potential Impact

For European organizations, the primary impact of CVE-2024-38102 is the potential for denial of service on systems running Windows 10 Version 1809 that utilize the Layer-2 Bridge Network Driver. This can disrupt critical network services, especially in environments relying on network bridging for virtualization, containerization, or complex network topologies. Service outages could affect business continuity, operational technology, and network infrastructure stability. Although the vulnerability does not allow for code execution or data compromise, the loss of availability can have cascading effects on dependent systems and services. Organizations in sectors such as finance, manufacturing, telecommunications, and government, where uptime and network reliability are paramount, may experience operational disruptions. The lack of known exploits reduces immediate risk, but the ease of exploitation without authentication means attackers with local network access could leverage this vulnerability in targeted attacks or lateral movement scenarios.

Mitigation Recommendations

To mitigate CVE-2024-38102, European organizations should first identify all systems running Windows 10 Version 1809, particularly those using network bridging features. Since no official patches are currently available, organizations should monitor Microsoft security advisories closely for updates. As an interim measure, disabling the Layer-2 Bridge Network Driver or the network bridging functionality on affected systems can reduce exposure. Network segmentation and strict access controls should be enforced to limit attacker access to local network segments where exploitation could occur. Intrusion detection systems and network monitoring tools should be configured to detect anomalous Layer-2 traffic patterns indicative of exploitation attempts. Organizations should also plan for timely patch deployment once Microsoft releases a fix, prioritizing critical infrastructure and systems with high network bridging usage. Regular vulnerability scanning and asset inventory updates will help maintain awareness of affected endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.184Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb9c8

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 12/10/2025, 12:37:32 AM

Last updated: 1/17/2026, 8:26:47 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats