Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38247: CWE-415: Double Free in Microsoft Windows 10 Version 1809

0
High
VulnerabilityCVE-2024-38247cvecve-2024-38247cwe-415
Published: Tue Sep 10 2024 (09/10/2024, 16:54:05 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Graphics Component Elevation of Privilege Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:58:58 UTC

Technical Analysis

CVE-2024-38247 is a vulnerability identified in the Windows Graphics Component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The root cause is a double free error (CWE-415), where the system attempts to free the same memory location twice, leading to memory corruption. This flaw can be exploited by an attacker with low privileges on the affected system to elevate their privileges to SYSTEM or equivalent, thereby gaining unauthorized administrative control. The vulnerability does not require user interaction and can be triggered locally, making it a potent vector for privilege escalation attacks. The CVSS v3.1 score of 7.8 reflects its high severity, with high impact on confidentiality, integrity, and availability. The attack vector is local (AV:L), with low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N). The vulnerability scope is unchanged (S:U), meaning the impact is limited to the vulnerable component's security context. No public exploits have been reported yet, but the vulnerability was reserved in June 2024 and published in September 2024, indicating recent discovery and disclosure. The lack of patch links suggests that a fix may be pending or in progress, emphasizing the need for vigilance and interim mitigations.

Potential Impact

If exploited, this vulnerability allows attackers with limited local access to escalate their privileges to SYSTEM level, potentially gaining full control over the affected machine. This can lead to unauthorized access to sensitive data, installation of persistent malware, disabling security controls, and disruption of system availability. In enterprise environments, compromised endpoints can serve as footholds for lateral movement, increasing the risk of widespread network compromise. The vulnerability affects Windows 10 Version 1809, which, although superseded by newer versions, remains in use in many organizations due to legacy application dependencies or delayed upgrade cycles. The high impact on confidentiality, integrity, and availability makes this a critical concern for organizations relying on this OS version, especially those in regulated industries or with sensitive data.

Mitigation Recommendations

Organizations should immediately inventory their systems to identify devices running Windows 10 Version 1809 (build 10.0.17763.0). Until an official patch is released, apply the following mitigations: restrict local user access to trusted personnel only, enforce least privilege principles to minimize the number of users with local access, and monitor for unusual local privilege escalation attempts via endpoint detection and response (EDR) tools. Disable or restrict access to the Windows Graphics Component if feasible, or apply application whitelisting to prevent untrusted code execution. Implement network segmentation to limit the impact of compromised endpoints. Once Microsoft releases a patch, prioritize its deployment in all affected environments. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.232Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c77b7ef31ef0b564b22

Added to database: 2/25/2026, 9:41:11 PM

Last enriched: 2/28/2026, 3:58:58 AM

Last updated: 4/12/2026, 2:02:17 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses