Skip to main content

CVE-2024-30003: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-30003cvecve-2024-30003cwe-190
Published: Tue May 14 2024 (05/14/2024, 16:57:04 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 04:59:25 UTC

Technical Analysis

CVE-2024-30003 is a security vulnerability identified in the Microsoft Windows 10 Version 1809 operating system, specifically affecting the Windows Mobile Broadband Driver. The vulnerability is classified as an integer overflow or wraparound issue (CWE-190). Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to unexpected behavior. In this case, the flaw exists within the Mobile Broadband Driver component, which handles cellular network connectivity for Windows devices. Exploiting this vulnerability could allow an attacker to execute arbitrary code remotely without requiring any privileges or user interaction. The CVSS v3.1 base score is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack vector is physical (local network or proximity), with low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, meaning a successful exploit could lead to full system compromise. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved on March 22, 2024, and published on May 14, 2024. Given the affected version is Windows 10 1809 (build 17763.0), which is an older release, the exposure is primarily to systems that have not been updated to newer Windows versions or have not applied relevant security updates.

Potential Impact

For European organizations, this vulnerability poses a significant risk, particularly to enterprises and government agencies that still operate legacy Windows 10 Version 1809 systems with Mobile Broadband capabilities. The ability for an unauthenticated attacker to remotely execute code with high impact on confidentiality, integrity, and availability means that sensitive data could be exfiltrated, systems could be manipulated or disrupted, and critical infrastructure could be compromised. Sectors relying on mobile broadband connectivity for remote or field operations—such as telecommunications, transportation, and emergency services—may face operational disruptions. Additionally, organizations with Bring Your Own Device (BYOD) policies that include Windows 10 1809 devices could inadvertently expose their networks. Although no exploits are currently known in the wild, the medium severity rating and the nature of the vulnerability suggest that attackers could develop exploits, especially given the low complexity and no user interaction required. The lack of available patches increases the window of exposure, emphasizing the need for immediate mitigation.

Mitigation Recommendations

1. Upgrade affected systems: Organizations should prioritize upgrading Windows 10 Version 1809 systems to a more recent, supported Windows version where this vulnerability is addressed. 2. Disable Mobile Broadband Driver if not required: For systems that do not require cellular connectivity, disabling or uninstalling the Mobile Broadband Driver can eliminate the attack surface. 3. Network segmentation: Isolate devices running Windows 10 1809 with Mobile Broadband capabilities from critical network segments to limit potential lateral movement. 4. Monitor network traffic: Implement enhanced monitoring for unusual or unexpected cellular network activity or driver behavior that could indicate exploitation attempts. 5. Apply vendor updates promptly: Although no patches are currently linked, organizations should monitor Microsoft’s security advisories closely and apply any forthcoming updates immediately. 6. Restrict physical access: Since the attack vector is physical, ensure that devices are protected from unauthorized physical access or proximity-based attacks. 7. Use endpoint detection and response (EDR) tools: Deploy EDR solutions capable of detecting anomalous driver behavior or code execution attempts related to the Mobile Broadband Driver.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:11.049Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb58f

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:59:25 AM

Last updated: 8/4/2025, 12:40:07 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats