CVE-2024-30003: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
AI Analysis
Technical Summary
CVE-2024-30003 is a security vulnerability identified in the Microsoft Windows 10 Version 1809 operating system, specifically affecting the Windows Mobile Broadband Driver. The vulnerability is classified as an integer overflow or wraparound issue (CWE-190). Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to unexpected behavior. In this case, the flaw exists within the Mobile Broadband Driver component, which handles cellular network connectivity for Windows devices. Exploiting this vulnerability could allow an attacker to execute arbitrary code remotely without requiring any privileges or user interaction. The CVSS v3.1 base score is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack vector is physical (local network or proximity), with low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, meaning a successful exploit could lead to full system compromise. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved on March 22, 2024, and published on May 14, 2024. Given the affected version is Windows 10 1809 (build 17763.0), which is an older release, the exposure is primarily to systems that have not been updated to newer Windows versions or have not applied relevant security updates.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly to enterprises and government agencies that still operate legacy Windows 10 Version 1809 systems with Mobile Broadband capabilities. The ability for an unauthenticated attacker to remotely execute code with high impact on confidentiality, integrity, and availability means that sensitive data could be exfiltrated, systems could be manipulated or disrupted, and critical infrastructure could be compromised. Sectors relying on mobile broadband connectivity for remote or field operations—such as telecommunications, transportation, and emergency services—may face operational disruptions. Additionally, organizations with Bring Your Own Device (BYOD) policies that include Windows 10 1809 devices could inadvertently expose their networks. Although no exploits are currently known in the wild, the medium severity rating and the nature of the vulnerability suggest that attackers could develop exploits, especially given the low complexity and no user interaction required. The lack of available patches increases the window of exposure, emphasizing the need for immediate mitigation.
Mitigation Recommendations
1. Upgrade affected systems: Organizations should prioritize upgrading Windows 10 Version 1809 systems to a more recent, supported Windows version where this vulnerability is addressed. 2. Disable Mobile Broadband Driver if not required: For systems that do not require cellular connectivity, disabling or uninstalling the Mobile Broadband Driver can eliminate the attack surface. 3. Network segmentation: Isolate devices running Windows 10 1809 with Mobile Broadband capabilities from critical network segments to limit potential lateral movement. 4. Monitor network traffic: Implement enhanced monitoring for unusual or unexpected cellular network activity or driver behavior that could indicate exploitation attempts. 5. Apply vendor updates promptly: Although no patches are currently linked, organizations should monitor Microsoft’s security advisories closely and apply any forthcoming updates immediately. 6. Restrict physical access: Since the attack vector is physical, ensure that devices are protected from unauthorized physical access or proximity-based attacks. 7. Use endpoint detection and response (EDR) tools: Deploy EDR solutions capable of detecting anomalous driver behavior or code execution attempts related to the Mobile Broadband Driver.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Poland, Netherlands, Belgium, Sweden, Finland
CVE-2024-30003: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809
Description
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-30003 is a security vulnerability identified in the Microsoft Windows 10 Version 1809 operating system, specifically affecting the Windows Mobile Broadband Driver. The vulnerability is classified as an integer overflow or wraparound issue (CWE-190). Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to unexpected behavior. In this case, the flaw exists within the Mobile Broadband Driver component, which handles cellular network connectivity for Windows devices. Exploiting this vulnerability could allow an attacker to execute arbitrary code remotely without requiring any privileges or user interaction. The CVSS v3.1 base score is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack vector is physical (local network or proximity), with low attack complexity, no privileges required, and no user interaction needed. The impact on confidentiality, integrity, and availability is high, meaning a successful exploit could lead to full system compromise. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved on March 22, 2024, and published on May 14, 2024. Given the affected version is Windows 10 1809 (build 17763.0), which is an older release, the exposure is primarily to systems that have not been updated to newer Windows versions or have not applied relevant security updates.
Potential Impact
For European organizations, this vulnerability poses a significant risk, particularly to enterprises and government agencies that still operate legacy Windows 10 Version 1809 systems with Mobile Broadband capabilities. The ability for an unauthenticated attacker to remotely execute code with high impact on confidentiality, integrity, and availability means that sensitive data could be exfiltrated, systems could be manipulated or disrupted, and critical infrastructure could be compromised. Sectors relying on mobile broadband connectivity for remote or field operations—such as telecommunications, transportation, and emergency services—may face operational disruptions. Additionally, organizations with Bring Your Own Device (BYOD) policies that include Windows 10 1809 devices could inadvertently expose their networks. Although no exploits are currently known in the wild, the medium severity rating and the nature of the vulnerability suggest that attackers could develop exploits, especially given the low complexity and no user interaction required. The lack of available patches increases the window of exposure, emphasizing the need for immediate mitigation.
Mitigation Recommendations
1. Upgrade affected systems: Organizations should prioritize upgrading Windows 10 Version 1809 systems to a more recent, supported Windows version where this vulnerability is addressed. 2. Disable Mobile Broadband Driver if not required: For systems that do not require cellular connectivity, disabling or uninstalling the Mobile Broadband Driver can eliminate the attack surface. 3. Network segmentation: Isolate devices running Windows 10 1809 with Mobile Broadband capabilities from critical network segments to limit potential lateral movement. 4. Monitor network traffic: Implement enhanced monitoring for unusual or unexpected cellular network activity or driver behavior that could indicate exploitation attempts. 5. Apply vendor updates promptly: Although no patches are currently linked, organizations should monitor Microsoft’s security advisories closely and apply any forthcoming updates immediately. 6. Restrict physical access: Since the attack vector is physical, ensure that devices are protected from unauthorized physical access or proximity-based attacks. 7. Use endpoint detection and response (EDR) tools: Deploy EDR solutions capable of detecting anomalous driver behavior or code execution attempts related to the Mobile Broadband Driver.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-03-22T23:12:11.049Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb58f
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 4:59:25 AM
Last updated: 8/4/2025, 12:40:07 PM
Views: 14
Related Threats
CVE-2025-9053: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9052: SQL Injection in projectworlds Travel Management System
MediumCVE-2025-9019: Heap-based Buffer Overflow in tcpreplay
LowCVE-2025-9017: Cross Site Scripting in PHPGurukul Zoo Management System
MediumCVE-2025-9051: SQL Injection in projectworlds Travel Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.