Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38236: CWE-400: Uncontrolled Resource Consumption in Microsoft Windows Server 2019

0
High
VulnerabilityCVE-2024-38236cvecve-2024-38236cwe-400
Published: Tue Sep 10 2024 (09/10/2024, 16:53:44 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

CVE-2024-38236 is a high-severity vulnerability in the DHCP Server service of Microsoft Windows Server 2019 (version 10. 0. 17763. 0). It is classified as an uncontrolled resource consumption issue (CWE-400) that can be exploited remotely without authentication or user interaction. Successful exploitation leads to a denial of service (DoS) condition by exhausting server resources, causing service disruption. There are no known exploits in the wild yet, and no patches have been published at the time of analysis. The vulnerability has a CVSS v3. 1 base score of 7. 5, indicating a significant risk to availability.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:31:09 UTC

Technical Analysis

CVE-2024-38236 is a denial of service vulnerability affecting the DHCP Server service in Microsoft Windows Server 2019 version 10.0.17763.0. The root cause is an uncontrolled resource consumption flaw (CWE-400), where specially crafted DHCP requests can cause the server to consume excessive system resources such as memory or CPU cycles. This resource exhaustion leads to service degradation or complete denial of DHCP service, impacting network availability. The vulnerability can be triggered remotely over the network without requiring any authentication or user interaction, making it highly accessible to attackers. The CVSS v3.1 score of 7.5 reflects the ease of exploitation (network vector, low complexity) and the high impact on availability, while confidentiality and integrity remain unaffected. No patches or official mitigations have been released yet, and no known exploits are publicly reported. The vulnerability was reserved in June 2024 and published in September 2024. The DHCP Server is critical infrastructure in many enterprise and service provider networks, so disruption can have widespread effects on network operations and dependent services.

Potential Impact

The primary impact of CVE-2024-38236 is denial of service against DHCP Server services running on Windows Server 2019, leading to network outages or degraded service availability. Organizations relying on DHCP for IP address allocation and network configuration could experience significant disruptions, affecting end-user connectivity, internal services, and dependent applications. This could result in operational downtime, loss of productivity, and potential cascading failures in network-dependent systems. Since the vulnerability does not affect confidentiality or integrity, data breaches are unlikely, but the availability impact alone can be severe, especially in large-scale or critical infrastructure environments. The ease of remote exploitation without authentication increases the risk of opportunistic attacks or targeted disruption campaigns. The lack of known exploits currently provides a limited window for proactive mitigation before potential weaponization.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following specific mitigations: 1) Restrict network access to DHCP Server ports (UDP 67/68) using firewalls or network segmentation to limit exposure to untrusted networks. 2) Monitor DHCP Server resource utilization closely to detect abnormal spikes indicative of exploitation attempts. 3) Employ rate limiting or traffic filtering on DHCP requests at network perimeter devices to reduce the risk of resource exhaustion. 4) Consider deploying DHCP failover or redundancy configurations to maintain service availability if one server is impacted. 5) Keep Windows Server 2019 systems updated with the latest cumulative updates and security patches to minimize attack surface. 6) Prepare for rapid deployment of the official patch once available by maintaining an up-to-date asset inventory and testing patch procedures. 7) Review and harden DHCP Server configurations to minimize unnecessary exposure and logging to aid in incident response. These targeted steps go beyond generic advice by focusing on network-level controls and operational readiness specific to DHCP service availability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c76b7ef31ef0b564aa9

Added to database: 2/25/2026, 9:41:10 PM

Last enriched: 2/26/2026, 5:31:09 AM

Last updated: 2/26/2026, 6:18:34 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats