Skip to main content

CVE-2024-49107: CWE-59: Improper Link Resolution Before File Access ('Link Following') in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2024-49107cvecve-2024-49107cwe-59cwe-284
Published: Tue Dec 10 2024 (12/10/2024, 17:49:19 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

WmsRepair Service Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 20:41:41 UTC

Technical Analysis

CVE-2024-49107 is a high-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability stems from improper link resolution before file access in the WmsRepair Service, categorized under CWE-59 (Improper Link Resolution Before File Access, also known as 'Link Following'). This flaw allows an attacker with limited privileges (low-level privileges) to exploit symbolic link or junction point handling weaknesses to gain higher privileges on the affected system. Specifically, the vulnerability arises because the WmsRepair Service does not correctly validate or resolve symbolic links before accessing files, which can be manipulated to point to sensitive files or locations. The CVSS v3.1 base score is 7.3, indicating a high severity level. The vector string (AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H) shows that the attack requires local access with low complexity, low privileges, and some user interaction, but can result in full compromise of confidentiality, integrity, and availability. No known exploits are currently reported in the wild, and no patches or mitigations have been linked yet. The vulnerability impacts Windows 10 Version 1809, which is an older, but still in-use version of Windows 10, primarily in enterprise environments that have not upgraded to newer versions. The vulnerability could be leveraged by attackers to escalate privileges from a limited user account to SYSTEM or administrator level, enabling them to execute arbitrary code, install persistent malware, or disrupt system operations.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for enterprises and public sector entities still running Windows 10 Version 1809. Successful exploitation could allow attackers to bypass user privilege restrictions, leading to full system compromise. This could result in data breaches, unauthorized access to sensitive information, disruption of critical services, and potential lateral movement within corporate networks. Given the high impact on confidentiality, integrity, and availability, organizations handling sensitive personal data (e.g., financial institutions, healthcare providers, government agencies) face increased risks of regulatory non-compliance (e.g., GDPR violations) and reputational damage. The requirement for local access and user interaction somewhat limits remote exploitation, but insider threats or malware that gains initial foothold with limited privileges could leverage this vulnerability to escalate privileges and deepen compromise.

Mitigation Recommendations

European organizations should prioritize upgrading or patching affected Windows 10 Version 1809 systems as soon as Microsoft releases an official security update. In the absence of a patch, organizations should implement strict local user privilege management, minimizing the number of users with local access and restricting permissions to create or manipulate symbolic links. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor suspicious file system activities, especially related to symbolic link creation or modification. User education to avoid executing untrusted files or links can reduce the risk of user interaction-based exploitation. Network segmentation and limiting lateral movement capabilities can contain potential escalations. Additionally, organizations should review and harden configurations of the WmsRepair Service and related Windows services to restrict unnecessary access. Regular auditing of privileged accounts and monitoring for unusual privilege escalation attempts are also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-10-11T20:57:49.205Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd6245

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 8:41:41 PM

Last updated: 8/7/2025, 12:38:11 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats