Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43458: CWE-908: Use of Uninitialized Resource in Microsoft Windows 10 Version 1607

0
High
VulnerabilityCVE-2024-43458cvecve-2024-43458cwe-908
Published: Tue Sep 10 2024 (09/10/2024, 16:54:13 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1607

Description

Windows Networking Information Disclosure Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:47:13 UTC

Technical Analysis

CVE-2024-43458 is a vulnerability classified under CWE-908 (Use of Uninitialized Resource) that affects Microsoft Windows 10 Version 1607 (build 10.0.14393.0). The flaw resides in the networking component of the operating system, where uninitialized resources are used improperly, potentially exposing sensitive networking information to unauthorized parties. This vulnerability allows an attacker to remotely exploit the system over the network (AV:N) with low attack complexity (AC:L) and requires only low privileges (PR:L), without any user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect resources beyond the initially compromised component. The impact is primarily on confidentiality (C:H), with no impact on integrity or availability. The vulnerability was reserved in August 2024 and published in September 2024, with no known exploits in the wild or patches currently available. This suggests the vulnerability is newly disclosed and may be targeted soon. The affected Windows 10 version is an older Long-Term Servicing Channel (LTSC) release, still in use in some enterprise and industrial environments. The lack of patches and the high confidentiality impact make this a significant risk for organizations relying on this OS version for critical operations.

Potential Impact

The primary impact of CVE-2024-43458 is the unauthorized disclosure of sensitive networking information, which could include configuration details, credentials, or other data that attackers can leverage for further intrusion or lateral movement. Since the vulnerability can be exploited remotely over the network with low privileges and no user interaction, it poses a substantial risk to exposed systems. Organizations running Windows 10 Version 1607 in enterprise, industrial control, or critical infrastructure environments could face data breaches or targeted attacks exploiting this flaw. The confidentiality breach could facilitate espionage, data theft, or preparation for more destructive attacks. Although integrity and availability are not directly affected, the information disclosed could enable attackers to compromise these aspects later. The absence of patches increases the window of exposure, and the vulnerability’s presence in an older OS version means organizations that have not upgraded or migrated remain vulnerable. This could lead to regulatory compliance issues and reputational damage if exploited.

Mitigation Recommendations

Until an official patch is released, organizations should implement specific mitigations to reduce risk. First, identify and inventory all systems running Windows 10 Version 1607 (build 10.0.14393.0) to understand exposure. Limit network exposure of these systems by restricting inbound traffic to trusted sources and segmenting vulnerable hosts from critical networks. Employ network-level controls such as firewalls and intrusion detection/prevention systems configured to monitor for unusual or unauthorized access attempts targeting networking services. Enforce the principle of least privilege to minimize user accounts with network access rights on affected systems. Enable enhanced logging and monitoring to detect suspicious activity related to network information access. Consider upgrading or migrating affected systems to a supported Windows version with active security updates. If upgrading is not immediately feasible, apply host-based mitigations such as disabling unnecessary networking features or services that could be exploited. Maintain awareness of vendor advisories for patch releases and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-08-14T01:08:33.515Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd8b7ef31ef0b5697d7

Added to database: 2/25/2026, 9:42:48 PM

Last enriched: 2/26/2026, 7:47:13 AM

Last updated: 4/12/2026, 2:03:07 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses