Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38105: CWE-20: Improper Input Validation in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-38105cvecve-2024-38105cwe-20
Published: Tue Jul 09 2024 (07/09/2024, 17:03:26 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 10/14/2025, 23:34:37 UTC

Technical Analysis

CVE-2024-38105 is a vulnerability identified in the Windows Layer-2 Bridge Network Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The root cause is improper input validation (CWE-20), which allows specially crafted network packets to trigger a denial of service (DoS) condition. The Layer-2 Bridge Network Driver is responsible for bridging network traffic at the data link layer, and improper handling of input can cause the system to crash or become unresponsive. The vulnerability can be exploited remotely over the network without requiring any privileges or user interaction, making it relatively easy for attackers to disrupt affected systems. The CVSS 3.1 base score is 6.5 (medium severity), reflecting the impact on availability only, with no confidentiality or integrity loss. No public exploits or active exploitation have been reported to date. The vulnerability was reserved in June 2024 and published in July 2024, with no patch links currently available, indicating that remediation may be pending. This vulnerability is particularly relevant for environments still running Windows 10 Version 1809, which is an older release but may remain in use in some enterprise or industrial contexts. Attackers could leverage this flaw to cause network outages or disrupt critical services by forcing system crashes remotely.

Potential Impact

For European organizations, the primary impact of CVE-2024-38105 is on system availability. A successful exploitation can cause denial of service on affected Windows 10 Version 1809 machines, potentially disrupting network operations, especially in environments relying on Layer-2 bridging such as virtualized networks, industrial control systems, or complex enterprise LANs. This could lead to downtime, loss of productivity, and interruption of critical services. Since no confidentiality or integrity impact is present, data breaches are unlikely. However, the ease of remote exploitation without authentication increases the risk of widespread disruption, particularly in sectors with legacy systems or insufficient network segmentation. Organizations in healthcare, manufacturing, government, and telecommunications could face operational challenges if vulnerable systems are exposed to untrusted networks. The lack of current exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released.

Mitigation Recommendations

Organizations should prioritize identifying and inventorying all Windows 10 Version 1809 systems within their networks. Until a patch is released, network-level mitigations should be applied, including restricting inbound traffic to trusted sources, implementing strict firewall rules, and segmenting networks to isolate vulnerable systems. Monitoring network traffic for anomalous packets targeting Layer-2 bridging functions can help detect exploitation attempts. Applying vendor updates promptly once available is critical. Additionally, organizations should consider upgrading legacy Windows 10 1809 systems to supported versions with ongoing security updates to reduce exposure. Employing network access controls and intrusion prevention systems that can detect and block malformed packets targeting this vulnerability will further reduce risk. Regular backups and incident response plans should be reviewed to prepare for potential denial of service incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.186Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb30a

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 10/14/2025, 11:34:37 PM

Last updated: 10/15/2025, 11:26:02 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats