CVE-2024-30051

ENISA EUVD: EUVD-2024-27989 ↗
Exploited in the Wild ✓ Confirmed 0-Day ★ Google Project Zero
Triaged: March 3, 2026 6 articles Published: 2024-05-14

EPSS Score

Source: FIRST.org · 2026-05-23
50.84%
probability
This CVE has a 50.84% probability of being exploited in the next 30 days.
0% Top 97.9th percentile of all CVEs 100%

CVSS v3.1

Source: VulnerabilityLookup (CIRCL)
7.8
HIGH
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Temporal
Exploit Code Maturity
Functional
Remediation Level
Official Fix
Report Confidence
Confirmed
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C

Description

NVD
Windows DWM Core Library Elevation of Privilege Vulnerability

Affected Products

Microsoft
Windows 10 Version 1809
10.0.17763.0
Microsoft
Windows 10 Version 1809
10.0.0
Microsoft
Windows Server 2019
10.0.17763.0
Microsoft
Windows Server 2019 (Server Core installation)
10.0.17763.0
Microsoft
Windows Server 2022
10.0.20348.0

Attack Intelligence

Google Project Zero

Patched
May 14, 2024
Reported by
Mert Degirmenci and Boris Larin with Kaspersky Quan Jin with DBAPPSecurity WeBin Lab Guoxian Zhong with DBAPPSecurity WeBin Lab Vlad Stolyarov and Benoit Sevens of Google Threat Analysis Group Bryce Abdo and Adam Brunner of Google Mandiant
Root Cause Analysis
???

Exploits & PoC

devianntsec/CVE-2024-30051

Master's Thesis research on CVE-2024-30051 (Windows DWM Heap Overflow). Features a high-reliability exploit with automated heap spray optimization, re

0 2026-05-06
2 repos — triés par ⭐ Rechercher sur GitHub ↗

Signal Intelligence

Confidence
82%
EPSS 50.84%
CVSS v3.1 7.8
Mentions 6
Last Seen Jan 14, 2026

CNA Information

CNA Assigner
microsoft
CNA Title
Windows DWM Core Library Elevation of Privilege Vulnerability

Analyst Note

CVE-2024-30051 is confirmed as a Windows DWM Core Library elevation of privilege vulnerability with HIGH severity (CVSS 7.8) that has been actively exploited in the wild, as evidenced by coverage in TheHackerNews and BleepingComputer regarding Microsoft's January 2026 patch deployment. The vulnerability's inclusion in Google Project Zero research and multiple authoritative security sources provides strong corroboration for the confirmed status, though it is not yet listed in CISA KEV which slightly moderates confidence.

Threat Actors 1

Lazarus Group
apt_group Information theft and espionage 🇰🇵 KP

Triage Info

Decided atMar 03, 2026
Published DateMay 14, 2024