Skip to main content

CVE-2024-29999: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-29999cvecve-2024-29999cwe-190
Published: Tue May 14 2024 (05/14/2024, 16:57:02 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 05:12:49 UTC

Technical Analysis

CVE-2024-29999 is a vulnerability identified in the Windows Mobile Broadband Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The underlying issue is an integer overflow or wraparound (CWE-190), which occurs when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around unexpectedly. This vulnerability can be exploited remotely without requiring user interaction or privileges, as indicated by the CVSS vector (AV:P/AC:L/PR:N/UI:N). The flaw allows an attacker with network access to the affected driver to execute arbitrary code on the target system, potentially leading to full compromise of confidentiality, integrity, and availability of the affected device. The vulnerability is rated with a CVSS 3.1 base score of 6.8, categorized as medium severity. No known exploits have been reported in the wild as of the publication date (May 14, 2024), and no patches have been linked yet. The vulnerability affects a legacy version of Windows 10 (1809), which is no longer the latest but may still be in use in certain environments. The integer overflow in the Mobile Broadband Driver could be triggered by specially crafted network packets or data sent to the driver, leading to remote code execution without authentication or user interaction. This makes it a significant risk for systems that still operate on this version and have the vulnerable driver enabled and exposed to network access.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, particularly for those still running Windows 10 Version 1809 in production environments. The ability for remote code execution without authentication or user interaction means attackers could potentially gain full control over affected systems remotely, leading to data breaches, disruption of services, or use of compromised machines as footholds for lateral movement within networks. Critical infrastructure, government agencies, and enterprises relying on legacy Windows 10 systems with Mobile Broadband capabilities are at risk. The confidentiality of sensitive data could be compromised, integrity of systems altered, and availability disrupted through denial-of-service or destructive payloads. Since the vulnerability affects a network-facing driver, it could be exploited over mobile broadband connections or other network interfaces, increasing the attack surface. Although no exploits are known in the wild yet, the medium severity score and ease of exploitation without privileges or user interaction suggest that threat actors may develop exploits soon, especially targeting unpatched legacy systems common in industrial, healthcare, and public sectors across Europe.

Mitigation Recommendations

1. Immediate mitigation involves upgrading affected systems to a supported and patched version of Windows 10 or later where this vulnerability is resolved. Organizations should prioritize migrating away from Windows 10 Version 1809, which is out of mainstream support. 2. If upgrading is not immediately feasible, disable or restrict the Mobile Broadband Driver functionality where possible, especially on systems that do not require mobile broadband connectivity. 3. Implement network-level controls such as firewall rules to limit exposure of systems with Mobile Broadband interfaces to untrusted networks, reducing the attack surface. 4. Monitor network traffic for anomalous or malformed packets targeting mobile broadband interfaces that could indicate exploitation attempts. 5. Employ endpoint detection and response (EDR) solutions capable of detecting suspicious activity related to driver exploitation or remote code execution attempts. 6. Maintain strict asset inventory to identify all systems running Windows 10 Version 1809 and prioritize remediation efforts accordingly. 7. Stay updated with Microsoft security advisories for the release of patches or workarounds and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:11.048Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb569

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 5:12:49 AM

Last updated: 8/12/2025, 8:11:39 AM

Views: 20

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats