Skip to main content

CVE-2024-38136: CWE-416: Use After Free in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-38136cvecve-2024-38136cwe-416
Published: Tue Aug 13 2024 (08/13/2024, 17:30:12 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Resource Manager PSM Service Extension Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 03:28:08 UTC

Technical Analysis

CVE-2024-38136 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809, specifically version 10.0.17763.0. The vulnerability is classified as a Use After Free (CWE-416) issue within the Windows Resource Manager PSM Service Extension. Use After Free vulnerabilities occur when a program continues to use a pointer after the memory it points to has been freed, potentially leading to memory corruption, arbitrary code execution, or system crashes. In this case, the flaw allows an attacker with low privileges (PR:L) to escalate their privileges on the affected system without requiring user interaction (UI:N). The attack vector is local (AV:L), meaning the attacker must have local access to the system to exploit the vulnerability. The vulnerability impacts confidentiality, integrity, and availability (all rated high), indicating that successful exploitation could allow an attacker to gain full control over the system, access sensitive information, modify system settings, or cause denial of service. The complexity of exploitation is high (AC:H), suggesting that exploitation requires advanced skills or specific conditions. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that organizations should prioritize monitoring and prepare for patch deployment once available. The vulnerability was reserved in June 2024 and published in August 2024, showing it is a recent discovery. Given that Windows 10 Version 1809 is an older release, this vulnerability primarily affects systems that have not been upgraded to newer Windows versions or are maintained for legacy support reasons.

Potential Impact

For European organizations, the impact of CVE-2024-38136 can be significant, especially for those still operating legacy Windows 10 Version 1809 systems. An attacker exploiting this vulnerability could gain elevated privileges, potentially leading to full system compromise. This could result in unauthorized access to sensitive corporate data, disruption of critical business operations, and the deployment of further malware or ransomware. Sectors such as finance, healthcare, government, and critical infrastructure, which often have legacy systems and high-value data, are particularly at risk. Additionally, organizations subject to strict data protection regulations like GDPR could face compliance violations and financial penalties if breaches occur due to this vulnerability. The local attack vector limits remote exploitation, but insider threats or attackers who gain initial local access through other means could leverage this flaw to escalate privileges and move laterally within networks. The absence of known exploits in the wild provides a window of opportunity for proactive defense, but the high severity and potential impact necessitate urgent attention.

Mitigation Recommendations

European organizations should immediately identify and inventory all systems running Windows 10 Version 1809 to assess exposure. Given the lack of an official patch at the time of this report, organizations should implement compensating controls such as restricting local access to trusted users only, enforcing the principle of least privilege, and monitoring for unusual privilege escalation activities via endpoint detection and response (EDR) tools. Network segmentation can limit lateral movement if an attacker gains local access. Organizations should also prepare for rapid deployment of patches once Microsoft releases them, including testing in controlled environments to avoid operational disruptions. Additionally, applying application whitelisting and disabling unnecessary services related to the Windows Resource Manager PSM Service Extension can reduce the attack surface. Regular security awareness training to prevent social engineering or phishing that could lead to initial local access is also recommended. Finally, maintaining up-to-date backups and incident response plans will help mitigate damage in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.196Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb208

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 3:28:08 AM

Last updated: 8/6/2025, 12:23:30 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats