Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38235: CWE-416: Use After Free in Microsoft Windows 10 Version 1809

0
Medium
VulnerabilityCVE-2024-38235cvecve-2024-38235cwe-416
Published: Tue Sep 10 2024 (09/10/2024, 16:54:01 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

CVE-2024-38235 is a use-after-free vulnerability in Microsoft Windows 10 Version 1809's Hyper-V component that can cause a denial of service. The flaw allows an attacker with low privileges and local access to trigger a system crash, impacting availability without compromising confidentiality or integrity. Exploitation does not require user interaction but does require local privileges. No known exploits are currently in the wild. The vulnerability has a CVSS score of 6. 5, indicating medium severity. Organizations running Windows 10 Version 1809 with Hyper-V enabled should prioritize patching once updates become available. This vulnerability primarily affects environments using legacy Windows 10 versions, often found in enterprise or industrial settings. Mitigation includes restricting local access, disabling Hyper-V if not needed, and monitoring for unusual system crashes. Countries with significant Windows 10 1809 usage and critical infrastructure relying on Hyper-V virtualization are at higher risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:30:55 UTC

Technical Analysis

CVE-2024-38235 is a use-after-free vulnerability classified under CWE-416 affecting the Hyper-V virtualization component in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises when the system improperly manages memory, freeing an object while it is still in use, which can lead to a denial of service (DoS) condition. An attacker with low-level privileges on the local machine can exploit this flaw to cause the Hyper-V service or the host system to crash, resulting in loss of availability. The vulnerability does not impact confidentiality or integrity, as it does not allow code execution or data leakage. Exploitation requires local access and does not require user interaction, making it feasible in scenarios where an attacker has already compromised a low-privilege account or gained limited local access. The CVSS v3.1 score of 6.5 reflects the medium severity, with attack vector local, low attack complexity, low privileges required, no user interaction, and scope changed due to impact on system availability. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. This vulnerability is particularly relevant for organizations relying on Hyper-V virtualization on legacy Windows 10 systems, which may still be in use in enterprise, industrial, or specialized environments.

Potential Impact

The primary impact of CVE-2024-38235 is denial of service, which can disrupt business operations by causing system or virtual machine crashes. Organizations using Windows 10 Version 1809 with Hyper-V enabled may experience unexpected downtime, affecting availability of critical services hosted on virtual machines. Although confidentiality and integrity are not directly impacted, the loss of availability can have cascading effects on productivity, customer service, and operational continuity. Attackers with local access could leverage this vulnerability to escalate disruptions, particularly in environments where Hyper-V hosts multiple critical workloads. The medium severity rating suggests moderate risk, but the impact could be significant in sectors relying heavily on virtualization, such as finance, healthcare, manufacturing, and government. Since exploitation requires local privileges, the threat is more relevant in insider threat scenarios or where attackers have already gained foothold in the network.

Mitigation Recommendations

1. Apply patches promptly once Microsoft releases updates addressing CVE-2024-38235; monitor official Microsoft security advisories for patch availability. 2. Restrict local access to systems running Windows 10 Version 1809 with Hyper-V enabled by enforcing strict access controls and using least privilege principles. 3. Disable Hyper-V on systems where virtualization is not required to eliminate the attack surface. 4. Implement robust endpoint detection and response (EDR) solutions to monitor for unusual system crashes or Hyper-V service failures that may indicate exploitation attempts. 5. Regularly update and audit virtualization host configurations to ensure they adhere to security best practices. 6. Consider upgrading affected systems to supported Windows versions with ongoing security support to reduce exposure to legacy vulnerabilities. 7. Employ network segmentation to limit lateral movement opportunities for attackers who gain local access. 8. Conduct user training and awareness to reduce the risk of privilege escalation or local compromise that could lead to exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c76b7ef31ef0b564aa6

Added to database: 2/25/2026, 9:41:10 PM

Last enriched: 2/26/2026, 5:30:55 AM

Last updated: 2/26/2026, 7:54:00 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats