Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38106: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-38106cvecve-2024-38106cwe-591
Published: Tue Aug 13 2024 (08/13/2024, 17:29:59 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Kernel Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:27:51 UTC

Technical Analysis

CVE-2024-38106 is a vulnerability identified in Microsoft Windows 10 Version 1809 (build 10.0.17763.0) that involves improper handling of sensitive data storage in memory, specifically a failure to lock memory regions containing sensitive information securely. This issue is categorized under CWE-591, which pertains to sensitive data storage in improperly locked memory. The vulnerability resides in the Windows kernel, allowing an attacker with low privileges and local access to exploit the flaw to elevate their privileges. The improper locking of memory can lead to unauthorized access or leakage of sensitive kernel data, which can be leveraged to bypass security controls and gain higher system privileges. The CVSS 3.1 vector (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C) indicates that the attack requires local access, high attack complexity, and low privileges but no user interaction. The impact on confidentiality, integrity, and availability is high, meaning successful exploitation could lead to full system compromise. Although no public exploits are known at this time, the vulnerability's nature makes it a critical concern for affected systems. The vulnerability was reserved in June 2024 and published in August 2024, with no patch links currently provided, suggesting that mitigation or updates may be forthcoming or that organizations should monitor vendor advisories closely.

Potential Impact

The vulnerability poses a significant risk to organizations worldwide running Windows 10 Version 1809, particularly in environments where local user accounts have limited privileges but could be leveraged by attackers to escalate privileges to SYSTEM or kernel level. Successful exploitation can compromise system confidentiality by exposing sensitive kernel data, integrity by allowing unauthorized modification of system components, and availability by potentially causing system instability or denial of service. This can lead to full system compromise, enabling attackers to deploy malware, steal data, or disrupt operations. Critical infrastructure, government agencies, financial institutions, and enterprises relying on Windows 10 1809 are especially vulnerable, as attackers could use this flaw to gain persistent and stealthy access. The requirement for local access and high attack complexity somewhat limits remote exploitation but does not eliminate risk in environments with multiple users or where attackers have gained initial footholds.

Mitigation Recommendations

Organizations should immediately inventory their systems to identify those running Windows 10 Version 1809 (build 10.0.17763.0) and prioritize them for remediation. Although no official patches are currently linked, administrators should monitor Microsoft security advisories for updates or hotfixes addressing CVE-2024-38106. In the interim, restrict local user access and enforce the principle of least privilege to minimize the risk of local exploitation. Employ endpoint detection and response (EDR) solutions to monitor for unusual privilege escalation attempts and kernel-level anomalies. Consider upgrading affected systems to a newer, supported Windows version where this vulnerability is not present. Additionally, implement strict access controls, disable unnecessary local accounts, and use application whitelisting to reduce attack surface. Regularly audit and harden system configurations to prevent unauthorized local code execution. Network segmentation can also limit the spread of an attacker who gains local access on a compromised machine.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.187Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb1c4

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 2/28/2026, 4:27:51 AM

Last updated: 3/24/2026, 2:10:52 PM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses