CVE-2024-38123: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 24H2
Windows Bluetooth Driver Information Disclosure Vulnerability
AI Analysis
Technical Summary
CVE-2024-38123 is a medium-severity vulnerability identified in the Bluetooth driver of Microsoft Windows 11 Version 24H2 (build 10.0.26100.0). The vulnerability is classified as CWE-125, which corresponds to an out-of-bounds read condition. This type of flaw occurs when the software reads data outside the bounds of allocated memory, potentially exposing sensitive information. Specifically, this vulnerability allows an attacker with high privileges (PR:H) and local access (AV:L) to cause the Bluetooth driver to disclose information from memory that should not be accessible. The vulnerability does not require user interaction (UI:N) and does not affect system integrity or availability, but it impacts confidentiality (C:H). The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not propagate to other components. The CVSS 3.1 base score is 4.4, reflecting a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in June 2024 and published in August 2024, indicating recent discovery and disclosure. The technical root cause is an out-of-bounds read in the Windows Bluetooth driver, which could be leveraged by a local attacker with administrative privileges to read sensitive information from kernel memory, potentially leading to information disclosure that could aid further attacks or privilege escalation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to systems running Windows 11 Version 24H2 with Bluetooth enabled. Since exploitation requires local administrative privileges, the immediate risk of remote compromise is low. However, if an attacker gains local access—through physical presence, social engineering, or prior compromise—they could exploit this flaw to extract sensitive kernel memory information. This could lead to leakage of cryptographic keys, credentials, or other sensitive data, undermining confidentiality. Organizations with high-value intellectual property, sensitive personal data (e.g., healthcare, finance), or critical infrastructure could be impacted if attackers chain this vulnerability with other exploits to escalate privileges or move laterally. The lack of impact on integrity and availability limits the scope of damage, but confidentiality breaches can still have regulatory and reputational consequences under GDPR and other European data protection laws. The absence of known exploits in the wild provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
Given the requirement for local administrative privileges to exploit this vulnerability, European organizations should focus on minimizing the risk of unauthorized local access. Specific mitigation steps include: 1) Enforce strict access controls and limit administrative privileges to trusted personnel only. 2) Implement robust endpoint security solutions that detect and prevent privilege escalation attempts. 3) Disable Bluetooth functionality on Windows 11 systems where it is not required, reducing the attack surface. 4) Monitor system logs and audit trails for unusual local activity or attempts to access Bluetooth driver components. 5) Apply Windows updates promptly once Microsoft releases a security patch addressing CVE-2024-38123. 6) Use application whitelisting and device control policies to prevent unauthorized software or devices from connecting via Bluetooth. 7) Educate users about the risks of local attacks and the importance of physical security. These targeted measures go beyond generic advice by focusing on the specific attack vector and exploitation conditions of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland
CVE-2024-38123: CWE-125: Out-of-bounds Read in Microsoft Windows 11 Version 24H2
Description
Windows Bluetooth Driver Information Disclosure Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-38123 is a medium-severity vulnerability identified in the Bluetooth driver of Microsoft Windows 11 Version 24H2 (build 10.0.26100.0). The vulnerability is classified as CWE-125, which corresponds to an out-of-bounds read condition. This type of flaw occurs when the software reads data outside the bounds of allocated memory, potentially exposing sensitive information. Specifically, this vulnerability allows an attacker with high privileges (PR:H) and local access (AV:L) to cause the Bluetooth driver to disclose information from memory that should not be accessible. The vulnerability does not require user interaction (UI:N) and does not affect system integrity or availability, but it impacts confidentiality (C:H). The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component and does not propagate to other components. The CVSS 3.1 base score is 4.4, reflecting a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in June 2024 and published in August 2024, indicating recent discovery and disclosure. The technical root cause is an out-of-bounds read in the Windows Bluetooth driver, which could be leveraged by a local attacker with administrative privileges to read sensitive information from kernel memory, potentially leading to information disclosure that could aid further attacks or privilege escalation.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to systems running Windows 11 Version 24H2 with Bluetooth enabled. Since exploitation requires local administrative privileges, the immediate risk of remote compromise is low. However, if an attacker gains local access—through physical presence, social engineering, or prior compromise—they could exploit this flaw to extract sensitive kernel memory information. This could lead to leakage of cryptographic keys, credentials, or other sensitive data, undermining confidentiality. Organizations with high-value intellectual property, sensitive personal data (e.g., healthcare, finance), or critical infrastructure could be impacted if attackers chain this vulnerability with other exploits to escalate privileges or move laterally. The lack of impact on integrity and availability limits the scope of damage, but confidentiality breaches can still have regulatory and reputational consequences under GDPR and other European data protection laws. The absence of known exploits in the wild provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
Given the requirement for local administrative privileges to exploit this vulnerability, European organizations should focus on minimizing the risk of unauthorized local access. Specific mitigation steps include: 1) Enforce strict access controls and limit administrative privileges to trusted personnel only. 2) Implement robust endpoint security solutions that detect and prevent privilege escalation attempts. 3) Disable Bluetooth functionality on Windows 11 systems where it is not required, reducing the attack surface. 4) Monitor system logs and audit trails for unusual local activity or attempts to access Bluetooth driver components. 5) Apply Windows updates promptly once Microsoft releases a security patch addressing CVE-2024-38123. 6) Use application whitelisting and device control policies to prevent unauthorized software or devices from connecting via Bluetooth. 7) Educate users about the risks of local attacks and the importance of physical security. These targeted measures go beyond generic advice by focusing on the specific attack vector and exploitation conditions of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-06-11T22:36:08.192Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f71484d88663aeb1e7
Added to database: 5/20/2025, 6:59:03 PM
Last enriched: 7/4/2025, 3:25:31 AM
Last updated: 8/7/2025, 10:32:29 AM
Views: 17
Related Threats
CVE-2025-49895: CWE-352 Cross-Site Request Forgery (CSRF) in iThemes ServerBuddy by PluginBuddy.com
HighCVE-2025-55284: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in anthropics claude-code
HighCVE-2025-55286: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in vancluever z2d
HighCVE-2025-52621: CWE-346 Origin Validation Error in HCL Software BigFix SaaS Remediate
MediumCVE-2025-52620: CWE-20 Improper Input Validation in HCL Software BigFix SaaS Remediate
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.