Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43491: CWE-416: Use After Free in Microsoft Windows 10 Version 1507

0
Critical
VulnerabilityCVE-2024-43491cvecve-2024-43491cwe-416
Published: Tue Sep 10 2024 (09/10/2024, 16:54:20 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 10 Version 1507

Description

Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024—KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability. This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order. Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions are still under support.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:48:52 UTC

Technical Analysis

CVE-2024-43491 is a critical use-after-free vulnerability (CWE-416) identified in the servicing stack component of Microsoft Windows 10 Version 1507, specifically affecting Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions. The vulnerability emerged because recent servicing stack updates rolled back previous fixes for vulnerabilities in optional components, effectively reintroducing exploitable conditions. This rollback affects systems that installed the March 12, 2024 security update (KB5035858) or other updates released until August 2024. The use-after-free flaw allows an unauthenticated remote attacker to execute arbitrary code with system-level privileges without requiring user interaction, potentially leading to full compromise of the affected system’s confidentiality, integrity, and availability. The vulnerability does not impact later Windows 10 versions, which have maintained the fixes. Microsoft addressed the issue by releasing a September 2024 servicing stack update (KB5043936) and a corresponding security update (KB5043083), which must be installed in order to fully remediate the vulnerability. Notably, Windows 10 Version 1507 reached end of support for most editions in May 2017, leaving only the Enterprise 2015 LTSB and IoT Enterprise 2015 LTSB editions under support and vulnerable. No known active exploits have been reported, but the critical CVSS score of 9.8 reflects the high severity and ease of exploitation. Organizations running these legacy Windows 10 versions should urgently apply the patches to mitigate the risk.

Potential Impact

The impact of CVE-2024-43491 is severe, as exploitation allows remote attackers to execute arbitrary code at system level without any authentication or user interaction. This can lead to complete system compromise, including unauthorized access to sensitive data, disruption of system operations, and potential deployment of malware or ransomware. Since the vulnerability affects servicing stack components, it could also undermine the integrity of future updates and system stability. Organizations relying on Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions are at significant risk, especially if they have installed the vulnerable updates from March to August 2024. The vulnerability poses a critical threat to industries with legacy systems that have not migrated to newer Windows versions, including manufacturing, healthcare, and critical infrastructure sectors. The lack of required privileges or user interaction lowers the barrier for exploitation, increasing the likelihood of attacks if patches are not applied promptly.

Mitigation Recommendations

To mitigate CVE-2024-43491, organizations must install the September 2024 servicing stack update (KB5043936) first, followed by the September 2024 Windows security update (KB5043083) in that exact order. This sequence is critical to fully restore the previous fixes and eliminate the use-after-free vulnerability. Organizations should inventory their Windows 10 systems to identify any running Version 1507 Enterprise or IoT Enterprise LTSB editions and prioritize patch deployment on these devices. Given the end of support for most editions of Version 1507, organizations should also plan to migrate to supported Windows versions to reduce future risk. Additionally, monitoring network traffic and endpoint behavior for unusual activity can help detect potential exploitation attempts. Employing network segmentation and limiting exposure of vulnerable systems to untrusted networks can further reduce attack surface. Regular backups and incident response readiness are recommended to mitigate potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-08-14T01:08:33.521Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cdab7ef31ef0b56989d

Added to database: 2/25/2026, 9:42:50 PM

Last enriched: 2/26/2026, 7:48:52 AM

Last updated: 4/12/2026, 9:26:19 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses