Skip to main content

CVE-2024-30004: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-30004cvecve-2024-30004cwe-190
Published: Tue May 14 2024 (05/14/2024, 16:57:04 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 04:59:13 UTC

Technical Analysis

CVE-2024-30004 is a security vulnerability identified in the Microsoft Windows 10 Version 1809 operating system, specifically affecting the Windows Mobile Broadband Driver. The vulnerability is classified as an integer overflow or wraparound issue (CWE-190). Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to memory corruption or unexpected behavior. In this case, the flaw exists in how the Windows Mobile Broadband Driver processes certain inputs, which can be exploited remotely without requiring user interaction or prior authentication. The CVSS 3.1 base score for this vulnerability is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack vector requires physical proximity (AV:P), has low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means a successful exploit could lead to full compromise of the affected system, including remote code execution capabilities. No known exploits are currently reported in the wild, and no patches or mitigation links have been published yet. The vulnerability was reserved in March 2024 and published in May 2024. The affected version is specifically Windows 10 Version 1809 (build 10.0.17763.0), which is an older release of Windows 10, often still in use in certain enterprise environments. The vulnerability's exploitation requires physical proximity, likely because the Mobile Broadband Driver interacts with cellular or mobile broadband hardware, which may require the attacker to be near the target device or connected to the same mobile network. This limits the attack surface compared to fully remote network attacks but still poses a significant risk in environments where devices are mobile or used in public or semi-public spaces.

Potential Impact

For European organizations, the impact of CVE-2024-30004 can be significant, especially for sectors relying on mobile broadband connectivity such as transportation, logistics, field services, and remote workforce scenarios. The vulnerability allows remote code execution with high impact on confidentiality, integrity, and availability, potentially enabling attackers to take full control of affected devices. This could lead to data breaches, disruption of critical services, or use of compromised devices as footholds for lateral movement within corporate networks. Since the attack requires physical proximity, organizations with employees using Windows 10 Version 1809 devices in public or semi-public environments (e.g., airports, train stations, cafes) are at higher risk. Additionally, industries with high mobility requirements or those using embedded Windows 10 1809 systems in specialized equipment may be vulnerable. The lack of available patches increases the window of exposure. Given that Windows 10 Version 1809 is an older OS version, organizations that have not upgraded or migrated to newer Windows versions remain exposed. The potential for high-impact compromise underscores the need for immediate attention, especially in sectors handling sensitive personal data or critical infrastructure, which are heavily regulated in Europe under GDPR and NIS Directive frameworks.

Mitigation Recommendations

1. Immediate mitigation should focus on reducing physical exposure of devices running Windows 10 Version 1809 with mobile broadband capabilities. Limit device usage in untrusted or public environments where attackers could gain proximity. 2. Implement network segmentation and strict access controls to isolate devices with mobile broadband drivers from sensitive internal networks, minimizing lateral movement if compromise occurs. 3. Monitor network traffic and device behavior for anomalies indicative of exploitation attempts, focusing on mobile broadband interfaces. 4. Enforce strict device management policies to identify and inventory all Windows 10 Version 1809 devices, prioritizing their upgrade or replacement. 5. Expedite migration to supported Windows versions with active security updates, as newer versions are less likely to be vulnerable. 6. Until patches are released, consider disabling or restricting the Windows Mobile Broadband Driver where feasible, especially on devices that do not require mobile broadband connectivity. 7. Educate users about the risks of using vulnerable devices in public or semi-public spaces and encourage reporting of suspicious device behavior. 8. Collaborate with mobile network providers to detect and mitigate suspicious activity at the network level that could be related to exploitation attempts. These targeted mitigations go beyond generic advice by focusing on the unique aspects of this vulnerability, such as physical proximity and mobile broadband driver usage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:11.049Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb593

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:59:13 AM

Last updated: 8/1/2025, 12:35:05 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats