Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38105: CWE-20: Improper Input Validation in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-38105cvecve-2024-38105cwe-20
Published: Tue Jul 09 2024 (07/09/2024, 17:03:26 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 12/10/2025, 00:38:21 UTC

Technical Analysis

CVE-2024-38105 is a vulnerability identified in the Windows Layer-2 Bridge Network Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The root cause is improper input validation (CWE-20), which allows an attacker to send specially crafted network packets that the driver fails to properly handle. This leads to a denial of service (DoS) condition by crashing the affected system, impacting availability. The vulnerability does not require any privileges or user interaction, but the attacker must have network access to the targeted system. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the impact on availability and the ease of exploitation over the network. No known exploits have been reported in the wild as of the publication date. The vulnerability affects a legacy Windows 10 version that is still in use in some environments, particularly in industrial, governmental, or enterprise networks where legacy systems persist. The Layer-2 Bridge Network Driver is responsible for bridging network traffic at the data link layer, so disruption can affect network connectivity and services relying on this bridging functionality. Although no patch links are currently provided, organizations should monitor Microsoft advisories for updates. The vulnerability highlights the importance of proper input validation in network drivers to prevent DoS attacks.

Potential Impact

For European organizations, the primary impact of CVE-2024-38105 is the potential for denial of service on systems running Windows 10 Version 1809. This can disrupt network connectivity and availability of services that depend on the Layer-2 bridging functionality, potentially affecting internal communications and operations. Critical infrastructure sectors such as manufacturing, energy, transportation, and government agencies that still operate legacy Windows 10 systems may experience operational downtime or degraded network performance. While confidentiality and integrity are not directly impacted, the availability disruption could lead to secondary effects such as delayed business processes or inability to access network resources. The lack of required privileges or user interaction lowers the barrier for attackers with network access, increasing risk in environments with exposed or poorly segmented networks. However, the absence of known exploits in the wild reduces immediate threat urgency but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply any patches or updates addressing CVE-2024-38105 as soon as they become available. 2. Where patching legacy Windows 10 Version 1809 systems is not immediately feasible, implement network-level controls to restrict access to systems running this OS version, especially blocking suspicious or malformed Layer-2 network traffic. 3. Employ network segmentation and isolation to limit exposure of vulnerable systems to untrusted networks or users. 4. Use intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous Layer-2 bridging traffic patterns that could indicate exploitation attempts. 5. Conduct regular inventory and risk assessments to identify legacy Windows 10 1809 deployments and plan for upgrade or replacement to supported OS versions. 6. Educate network administrators about this vulnerability and encourage vigilance in monitoring network stability and unusual system crashes related to network bridging. 7. Consider deploying endpoint protection solutions capable of detecting and mitigating network driver anomalies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.186Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981dc4522896dcbdb30a

Added to database: 5/21/2025, 9:08:45 AM

Last enriched: 12/10/2025, 12:38:21 AM

Last updated: 1/19/2026, 9:54:23 AM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats