Strobes VIStrobes VI
CVE DatabaseThreat ActorsResearchAPI Docs
Visit Strobes.coSign Up for Strobes
CVE DatabaseThreat ActorsResearchAPI Docs
Tools
KB Lookup
Visit Strobes.coSign Up for Strobes
HomeCVEs

Do you like the insights?

Strobes vulnerability intelligence is a key component of their Exposure Management platform that helps organizations understand, prioritize, and address security vulnerabilities more effectively.

© 2026 Strobes Security. All rights reserved.
HomeCVEsCVE-2024-43491

CVE-2024-43491

Published: January 26, 2026
Last updated:9 hours ago (January 26, 2026)
Exploit: NoZero-day: YesPatch: YesTrend: Neutral
TL;DR
Updated January 26, 2026

CVE-2024-43491 is a critical severity vulnerability with a CVSS score of 9.8. No known exploits currently, and patches are available. This is classified as a zero-day vulnerability.

Key Points
  • 1Critical severity (CVSS 9.8/10)
  • 2EPSS: 20.00% - high likelihood of exploitation
  • 3No known public exploits
  • 4Vendor patches are available
  • 5Strobes Priority Score: 912/1000 (Critical)
  • 6Affects products from: Microsoft
Severity Scores
CVSS v39.8
CVSS v20.0
Priority Score912.0
EPSS Score20.0
Critical
Exploitation LikelihoodHigh
20.00%EPSS

High probability of exploitation in the next 30 days

Prioritize patching within days
20.00%
EPSS
9.8
CVSS
No
Exploit
Yes
Patch
Critical Priority
high EPSS • critical severity • high priority

EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.

Description

Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024—KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability. This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order. Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions are still under support.

CVSS v3 Breakdown
Attack Vector:Network
Attack Complexity:Local
Privileges Required:Network
User Interaction:Network
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability:High
Patch References
[email protected]Zeroday CZ
Trend Analysis
Neutral
Vulnerable Products
VendorProduct
MicrosoftWindows 10 1507
Advisories
GitHub Advisory
NVD: Microsoft is aware of a vulnerability in Servicing Stack that has rolled back the fixes for some vulnerabilities affecting Optional Components on Windows 10, version 1507 (initial version released July 2015). This means that an attacker could exploit these previously mitigated vulnerabilities on Windows 10, version 1507 (Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB) systems that have installed the Windows security update released on March 12, 2024—KB5035858 (OS Build 10240.20526) or other updates released until August 2024. All later versions of Windows 10 are not impacted by this vulnerability. This servicing stack vulnerability is addressed by installing the September 2024 Servicing stack update (SSU KB5043936) AND the September 2024 Windows security update (KB5043083), in that order. Note: Windows 10, version 1507 reached the end of support (EOS) on May 9, 2017 for devices running the Pro, Home, Enterprise, Education, and Enterprise IoT editions. Only Windows 10 Enterprise 2015 LTSB and Windows 10 IoT Enterprise 2015 LTSB editions are still under support.
Cite This Page
APA Format
Strobes VI. (2026). CVE-2024-43491 - CVE Details and Analysis. Strobes VI. Retrieved January 26, 2026, from https://vi.strobes.co/cve/CVE-2024-43491
Quick copy link + title

Please cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.