Skip to main content

CVE-2024-38118: CWE-908: Use of Uninitialized Resource in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-38118cvecve-2024-38118cwe-908
Published: Tue Aug 13 2024 (08/13/2024, 17:30:04 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Microsoft Local Security Authority (LSA) Server Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 03:24:33 UTC

Technical Analysis

CVE-2024-38118 is a vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Local Security Authority (LSA) Server component. The vulnerability is classified under CWE-908, which refers to the use of uninitialized resources. In this context, the LSA server may improperly handle certain resources that have not been initialized correctly, leading to an information disclosure issue. This flaw allows an attacker with limited privileges (local access with low complexity) to gain unauthorized access to sensitive information stored or processed by the LSA server. The vulnerability does not require user interaction and does not impact system integrity or availability but has a high impact on confidentiality. The CVSS v3.1 base score is 5.5 (medium severity), with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in June 2024 and published in August 2024. The affected version is Windows 10 Version 1809 (build 10.0.17763.0), which is an older release of Windows 10, meaning that many systems may have already moved to newer versions, but legacy or specialized environments might still be vulnerable.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality of sensitive information managed by the LSA server on affected Windows 10 Version 1809 systems. Since LSA handles authentication and security policies, disclosure of information could lead to further targeted attacks or privilege escalation attempts if combined with other vulnerabilities. Organizations in sectors with strict data protection regulations such as GDPR may face compliance risks if sensitive data is exposed. The impact is mitigated somewhat by the requirement for local access and low privileges, limiting remote exploitation. However, insider threats or attackers who gain initial footholds on affected systems could leverage this vulnerability to escalate their access or gather intelligence. The lack of known exploits reduces immediate risk, but the presence of unpatched legacy systems in critical infrastructure, manufacturing, or government sectors could increase exposure. Additionally, forensic investigations and incident response could be complicated if attackers use this vulnerability to obscure their activities by accessing sensitive security information.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying systems running Windows 10 Version 1809, especially those in critical roles or handling sensitive data. Since no official patches are linked yet, organizations should monitor Microsoft security advisories closely for updates or hotfixes addressing CVE-2024-38118. In the interim, applying strict access controls to limit local user privileges and restricting physical and remote access to affected systems can reduce exploitation risk. Employing endpoint detection and response (EDR) solutions to monitor unusual access patterns to LSA components may help detect exploitation attempts. Organizations should also consider upgrading affected systems to supported Windows versions with active security updates, as Windows 10 Version 1809 is out of mainstream support. Regular security audits and user privilege reviews will further reduce the attack surface. Finally, implementing network segmentation to isolate legacy systems and enforcing multi-factor authentication for administrative access can help contain potential breaches stemming from this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.191Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb1df

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 3:24:33 AM

Last updated: 8/8/2025, 2:28:10 AM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats