CVE-2024-30002: CWE-20: Improper Input Validation in Microsoft Windows 10 Version 1809
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
AI Analysis
Technical Summary
CVE-2024-30002 is a vulnerability identified in the Windows Mobile Broadband Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The underlying issue is classified as CWE-20, which refers to improper input validation. This vulnerability allows an attacker to execute remote code on the affected system by sending specially crafted input to the Mobile Broadband Driver. Because the driver operates at a low level within the operating system to manage mobile broadband hardware, exploitation can lead to full compromise of the system's confidentiality, integrity, and availability. The CVSS 3.1 base score is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack requires physical proximity (local network or direct connection) but no privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting this is a recently disclosed vulnerability. The improper input validation flaw could allow an attacker to send malicious data to the driver, triggering remote code execution, potentially leading to system takeover or disruption of services dependent on mobile broadband connectivity.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Windows 10 Version 1809 in environments where mobile broadband connectivity is critical—such as remote offices, mobile workforce scenarios, or industrial IoT deployments. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to data breaches, system downtime, or lateral movement within networks. Confidentiality is at high risk as attackers could access sensitive data; integrity could be compromised by altering system or application data; and availability could be disrupted by crashing or controlling the affected systems. Given that Windows 10 Version 1809 is an older release, some organizations may still be running it due to legacy application dependencies, increasing their exposure. The lack of user interaction and privileges needed for exploitation lowers the barrier for attackers with physical or network access to the device, raising concerns for environments with less stringent network segmentation or physical security controls.
Mitigation Recommendations
1. Immediate mitigation should focus on upgrading affected systems to a more recent, supported version of Windows 10 or Windows 11 where this vulnerability is patched or not present. 2. If upgrading is not immediately feasible, organizations should restrict access to mobile broadband interfaces by disabling or limiting driver usage where possible, especially on devices that do not require mobile broadband connectivity. 3. Implement strict network segmentation and access controls to limit exposure of devices running Windows 10 Version 1809 to untrusted networks or users. 4. Monitor network traffic for unusual activity targeting mobile broadband interfaces or unexpected driver communications. 5. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous behavior related to driver exploitation attempts. 6. Maintain an inventory of devices running the affected Windows version and prioritize patching or mitigation efforts accordingly. 7. Engage with Microsoft support channels for any forthcoming patches or workarounds and apply them promptly once available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2024-30002: CWE-20: Improper Input Validation in Microsoft Windows 10 Version 1809
Description
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-30002 is a vulnerability identified in the Windows Mobile Broadband Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The underlying issue is classified as CWE-20, which refers to improper input validation. This vulnerability allows an attacker to execute remote code on the affected system by sending specially crafted input to the Mobile Broadband Driver. Because the driver operates at a low level within the operating system to manage mobile broadband hardware, exploitation can lead to full compromise of the system's confidentiality, integrity, and availability. The CVSS 3.1 base score is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack requires physical proximity (local network or direct connection) but no privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting this is a recently disclosed vulnerability. The improper input validation flaw could allow an attacker to send malicious data to the driver, triggering remote code execution, potentially leading to system takeover or disruption of services dependent on mobile broadband connectivity.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Windows 10 Version 1809 in environments where mobile broadband connectivity is critical—such as remote offices, mobile workforce scenarios, or industrial IoT deployments. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to data breaches, system downtime, or lateral movement within networks. Confidentiality is at high risk as attackers could access sensitive data; integrity could be compromised by altering system or application data; and availability could be disrupted by crashing or controlling the affected systems. Given that Windows 10 Version 1809 is an older release, some organizations may still be running it due to legacy application dependencies, increasing their exposure. The lack of user interaction and privileges needed for exploitation lowers the barrier for attackers with physical or network access to the device, raising concerns for environments with less stringent network segmentation or physical security controls.
Mitigation Recommendations
1. Immediate mitigation should focus on upgrading affected systems to a more recent, supported version of Windows 10 or Windows 11 where this vulnerability is patched or not present. 2. If upgrading is not immediately feasible, organizations should restrict access to mobile broadband interfaces by disabling or limiting driver usage where possible, especially on devices that do not require mobile broadband connectivity. 3. Implement strict network segmentation and access controls to limit exposure of devices running Windows 10 Version 1809 to untrusted networks or users. 4. Monitor network traffic for unusual activity targeting mobile broadband interfaces or unexpected driver communications. 5. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous behavior related to driver exploitation attempts. 6. Maintain an inventory of devices running the affected Windows version and prioritize patching or mitigation efforts accordingly. 7. Engage with Microsoft support channels for any forthcoming patches or workarounds and apply them promptly once available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-03-22T23:12:11.049Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb58b
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 4:59:35 AM
Last updated: 7/28/2025, 8:25:27 AM
Views: 10
Related Threats
CVE-2025-50610: n/a
HighCVE-2025-50609: n/a
HighCVE-2025-50608: n/a
HighCVE-2025-55194: CWE-248: Uncaught Exception in Part-DB Part-DB-server
MediumCVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.