Skip to main content

CVE-2024-38145: CWE-476: NULL Pointer Dereference in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-38145cvecve-2024-38145cwe-476
Published: Tue Aug 13 2024 (08/13/2024, 17:30:17 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 03:40:38 UTC

Technical Analysis

CVE-2024-38145 is a high-severity vulnerability identified in the Windows Layer-2 Bridge Network Driver affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-476, which corresponds to a NULL Pointer Dereference. This type of flaw occurs when the software attempts to dereference a pointer that has a NULL value, leading to an unexpected behavior such as a system crash or denial of service (DoS). Specifically, this vulnerability allows an unauthenticated attacker to remotely trigger a denial of service condition by sending specially crafted network packets that exploit the Layer-2 Bridge Network Driver. The CVSS 3.1 base score is 7.5, indicating a high severity, with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C. This means the attack can be executed remotely over the network without any privileges or user interaction, and it results in a complete loss of availability (system crash or reboot). There is no impact on confidentiality or integrity. The vulnerability does not require authentication or user interaction, making it easier to exploit in unpatched systems. Although no known exploits are currently reported in the wild, the presence of this vulnerability in a widely used operating system version makes it a significant risk. No official patch links are provided yet, but the vulnerability is publicly disclosed and tracked by Microsoft and CISA, indicating that mitigation efforts are likely forthcoming.

Potential Impact

For European organizations, the impact of CVE-2024-38145 can be substantial, especially for those still operating legacy systems running Windows 10 Version 1809. The vulnerability enables remote attackers to cause denial of service conditions, potentially disrupting critical business operations, network infrastructure, and services reliant on affected systems. This can lead to downtime, loss of productivity, and increased operational costs. Sectors such as finance, healthcare, manufacturing, and government agencies that depend on stable network connectivity and system availability are particularly vulnerable. Additionally, denial of service attacks can be used as a smokescreen for other malicious activities, increasing the risk of secondary attacks. Since the vulnerability affects a network driver, it could impact devices acting as network bridges or routers within enterprise environments, amplifying the scope of disruption. The lack of confidentiality or integrity impact reduces the risk of data breaches but does not diminish the operational risk posed by service outages.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying all systems running Windows 10 Version 1809 to assess exposure. Immediate mitigation steps include: 1) Applying any available security updates or patches from Microsoft as soon as they are released. 2) If patches are not yet available, consider disabling or restricting the use of the Layer-2 Bridge Network Driver where feasible, especially on systems exposed to untrusted networks. 3) Implement network segmentation and firewall rules to limit exposure of vulnerable systems to untrusted or external networks. 4) Monitor network traffic for unusual or malformed packets that could indicate exploitation attempts targeting the Layer-2 Bridge Network Driver. 5) Employ intrusion detection/prevention systems (IDS/IPS) with updated signatures once available. 6) Plan for upgrading affected systems to supported Windows versions that have received security updates. 7) Conduct regular backups and ensure incident response plans are updated to handle potential denial of service incidents. These steps go beyond generic advice by focusing on driver-specific controls and network-level protections tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.206Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f71484d88663aeb223

Added to database: 5/20/2025, 6:59:03 PM

Last enriched: 7/4/2025, 3:40:38 AM

Last updated: 8/4/2025, 3:27:08 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats