Skip to main content

CVE-2024-38125: CWE-197: Numeric Truncation Error in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-38125cvecve-2024-38125cwe-197
Published: Tue Aug 13 2024 (08/13/2024, 17:30:06 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 03:25:45 UTC

Technical Analysis

CVE-2024-38125 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The flaw resides in the Kernel Streaming WOW Thunk Service Driver, where a numeric truncation error (CWE-197) occurs. Numeric truncation errors happen when a numeric value is converted to a type that is too small to hold it, potentially leading to incorrect values being used in security-critical operations. In this case, the truncation error can be exploited by an attacker with limited privileges (low privileges, PR:L) to escalate their privileges to higher levels, potentially SYSTEM or kernel-level privileges. The vulnerability does not require user interaction (UI:N) and has low attack complexity (AC:L), but requires local access (AV:L) and some privileges already (PR:L). The impact on confidentiality, integrity, and availability is rated high (C:H/I:H/A:H), meaning successful exploitation could allow an attacker to fully compromise the affected system. The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component and does not extend beyond the security scope. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and rated with a CVSS 3.1 score of 7.8, reflecting a significant risk. The vulnerability was reserved in June 2024 and published in August 2024. No official patches or mitigations are linked yet, so affected systems remain vulnerable until updates are released. This vulnerability specifically targets Windows 10 Version 1809, an older but still in-use version of Windows 10, particularly in enterprise environments where legacy systems persist. The Kernel Streaming WOW Thunk Service Driver is a critical component related to multimedia kernel streaming, and its compromise could allow attackers to execute arbitrary code with elevated privileges, bypassing security controls and potentially deploying persistent malware or ransomware.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those still operating Windows 10 Version 1809 in production environments. Successful exploitation could allow attackers to escalate privileges locally, bypass security restrictions, and gain full control over affected systems. This could lead to data breaches, disruption of critical services, and deployment of ransomware or other malware. Industries with legacy systems such as manufacturing, healthcare, and government agencies are particularly at risk. The high impact on confidentiality, integrity, and availability means sensitive personal data protected under GDPR could be exposed, leading to regulatory fines and reputational damage. Additionally, the ability to elevate privileges without user interaction increases the risk of automated or stealthy attacks within internal networks. The lack of known exploits currently provides a window for proactive mitigation, but the public disclosure means attackers may develop exploits soon. Organizations relying on Windows 10 Version 1809 should prioritize identifying and remediating this vulnerability to prevent potential compromise.

Mitigation Recommendations

1. Immediate identification of all systems running Windows 10 Version 1809 (build 10.0.17763.0) within the organization using asset management and endpoint detection tools. 2. Apply any available security updates or patches from Microsoft as soon as they are released; monitor Microsoft security advisories closely. 3. If patches are not yet available, consider temporary mitigations such as restricting local user privileges to the minimum necessary, disabling or restricting access to the Kernel Streaming WOW Thunk Service Driver if feasible, or applying application whitelisting to prevent unauthorized code execution. 4. Enhance monitoring for unusual local privilege escalation attempts or suspicious activity related to kernel streaming components using endpoint detection and response (EDR) tools. 5. Conduct user awareness and training to reduce the risk of local attackers gaining initial access. 6. Plan for upgrading legacy Windows 10 Version 1809 systems to supported, fully patched versions of Windows 10 or Windows 11 to reduce exposure to this and other vulnerabilities. 7. Implement network segmentation to limit the lateral movement potential of an attacker who gains local access. 8. Regularly review and audit local user accounts and privileges to minimize the number of users with elevated rights.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.193Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb1e9

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 3:25:45 AM

Last updated: 8/9/2025, 12:43:35 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats