Skip to main content

CVE-2024-30002: CWE-20: Improper Input Validation in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-30002cvecve-2024-30002cwe-20
Published: Tue May 14 2024 (05/14/2024, 16:57:03 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 04:59:35 UTC

Technical Analysis

CVE-2024-30002 is a vulnerability identified in the Windows Mobile Broadband Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The underlying issue is classified as CWE-20, which refers to improper input validation. This vulnerability allows an attacker to execute remote code on the affected system by sending specially crafted input to the Mobile Broadband Driver. Because the driver operates at a low level within the operating system to manage mobile broadband hardware, exploitation can lead to full compromise of the system's confidentiality, integrity, and availability. The CVSS 3.1 base score is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack requires physical proximity (local network or direct connection) but no privileges or user interaction, and it impacts confidentiality, integrity, and availability to a high degree. No known exploits are currently reported in the wild, and no patches are linked yet, suggesting this is a recently disclosed vulnerability. The improper input validation flaw could allow an attacker to send malicious data to the driver, triggering remote code execution, potentially leading to system takeover or disruption of services dependent on mobile broadband connectivity.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Windows 10 Version 1809 in environments where mobile broadband connectivity is critical—such as remote offices, mobile workforce scenarios, or industrial IoT deployments. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to data breaches, system downtime, or lateral movement within networks. Confidentiality is at high risk as attackers could access sensitive data; integrity could be compromised by altering system or application data; and availability could be disrupted by crashing or controlling the affected systems. Given that Windows 10 Version 1809 is an older release, some organizations may still be running it due to legacy application dependencies, increasing their exposure. The lack of user interaction and privileges needed for exploitation lowers the barrier for attackers with physical or network access to the device, raising concerns for environments with less stringent network segmentation or physical security controls.

Mitigation Recommendations

1. Immediate mitigation should focus on upgrading affected systems to a more recent, supported version of Windows 10 or Windows 11 where this vulnerability is patched or not present. 2. If upgrading is not immediately feasible, organizations should restrict access to mobile broadband interfaces by disabling or limiting driver usage where possible, especially on devices that do not require mobile broadband connectivity. 3. Implement strict network segmentation and access controls to limit exposure of devices running Windows 10 Version 1809 to untrusted networks or users. 4. Monitor network traffic for unusual activity targeting mobile broadband interfaces or unexpected driver communications. 5. Employ endpoint detection and response (EDR) solutions capable of detecting anomalous behavior related to driver exploitation attempts. 6. Maintain an inventory of devices running the affected Windows version and prioritize patching or mitigation efforts accordingly. 7. Engage with Microsoft support channels for any forthcoming patches or workarounds and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:11.049Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb58b

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:59:35 AM

Last updated: 7/28/2025, 8:25:27 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats