CVE-2024-30004: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
AI Analysis
Technical Summary
CVE-2024-30004 is a security vulnerability identified in the Microsoft Windows 10 Version 1809 operating system, specifically affecting the Windows Mobile Broadband Driver. The vulnerability is classified as an integer overflow or wraparound issue (CWE-190). Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to memory corruption or unexpected behavior. In this case, the flaw exists in how the Windows Mobile Broadband Driver processes certain inputs, which can be exploited remotely without requiring user interaction or prior authentication. The CVSS 3.1 base score for this vulnerability is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack vector requires physical proximity (AV:P), has low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means a successful exploit could lead to full compromise of the affected system, including remote code execution capabilities. No known exploits are currently reported in the wild, and no patches or mitigation links have been published yet. The vulnerability was reserved in March 2024 and published in May 2024. The affected version is specifically Windows 10 Version 1809 (build 10.0.17763.0), which is an older release of Windows 10, often still in use in certain enterprise environments. The vulnerability's exploitation requires physical proximity, likely because the Mobile Broadband Driver interacts with cellular or mobile broadband hardware, which may require the attacker to be near the target device or connected to the same mobile network. This limits the attack surface compared to fully remote network attacks but still poses a significant risk in environments where devices are mobile or used in public or semi-public spaces.
Potential Impact
For European organizations, the impact of CVE-2024-30004 can be significant, especially for sectors relying on mobile broadband connectivity such as transportation, logistics, field services, and remote workforce scenarios. The vulnerability allows remote code execution with high impact on confidentiality, integrity, and availability, potentially enabling attackers to take full control of affected devices. This could lead to data breaches, disruption of critical services, or use of compromised devices as footholds for lateral movement within corporate networks. Since the attack requires physical proximity, organizations with employees using Windows 10 Version 1809 devices in public or semi-public environments (e.g., airports, train stations, cafes) are at higher risk. Additionally, industries with high mobility requirements or those using embedded Windows 10 1809 systems in specialized equipment may be vulnerable. The lack of available patches increases the window of exposure. Given that Windows 10 Version 1809 is an older OS version, organizations that have not upgraded or migrated to newer Windows versions remain exposed. The potential for high-impact compromise underscores the need for immediate attention, especially in sectors handling sensitive personal data or critical infrastructure, which are heavily regulated in Europe under GDPR and NIS Directive frameworks.
Mitigation Recommendations
1. Immediate mitigation should focus on reducing physical exposure of devices running Windows 10 Version 1809 with mobile broadband capabilities. Limit device usage in untrusted or public environments where attackers could gain proximity. 2. Implement network segmentation and strict access controls to isolate devices with mobile broadband drivers from sensitive internal networks, minimizing lateral movement if compromise occurs. 3. Monitor network traffic and device behavior for anomalies indicative of exploitation attempts, focusing on mobile broadband interfaces. 4. Enforce strict device management policies to identify and inventory all Windows 10 Version 1809 devices, prioritizing their upgrade or replacement. 5. Expedite migration to supported Windows versions with active security updates, as newer versions are less likely to be vulnerable. 6. Until patches are released, consider disabling or restricting the Windows Mobile Broadband Driver where feasible, especially on devices that do not require mobile broadband connectivity. 7. Educate users about the risks of using vulnerable devices in public or semi-public spaces and encourage reporting of suspicious device behavior. 8. Collaborate with mobile network providers to detect and mitigate suspicious activity at the network level that could be related to exploitation attempts. These targeted mitigations go beyond generic advice by focusing on the unique aspects of this vulnerability, such as physical proximity and mobile broadband driver usage.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Finland
CVE-2024-30004: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809
Description
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-30004 is a security vulnerability identified in the Microsoft Windows 10 Version 1809 operating system, specifically affecting the Windows Mobile Broadband Driver. The vulnerability is classified as an integer overflow or wraparound issue (CWE-190). Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to memory corruption or unexpected behavior. In this case, the flaw exists in how the Windows Mobile Broadband Driver processes certain inputs, which can be exploited remotely without requiring user interaction or prior authentication. The CVSS 3.1 base score for this vulnerability is 6.8, indicating a medium severity level. The vector string (AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reveals that the attack vector requires physical proximity (AV:P), has low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means a successful exploit could lead to full compromise of the affected system, including remote code execution capabilities. No known exploits are currently reported in the wild, and no patches or mitigation links have been published yet. The vulnerability was reserved in March 2024 and published in May 2024. The affected version is specifically Windows 10 Version 1809 (build 10.0.17763.0), which is an older release of Windows 10, often still in use in certain enterprise environments. The vulnerability's exploitation requires physical proximity, likely because the Mobile Broadband Driver interacts with cellular or mobile broadband hardware, which may require the attacker to be near the target device or connected to the same mobile network. This limits the attack surface compared to fully remote network attacks but still poses a significant risk in environments where devices are mobile or used in public or semi-public spaces.
Potential Impact
For European organizations, the impact of CVE-2024-30004 can be significant, especially for sectors relying on mobile broadband connectivity such as transportation, logistics, field services, and remote workforce scenarios. The vulnerability allows remote code execution with high impact on confidentiality, integrity, and availability, potentially enabling attackers to take full control of affected devices. This could lead to data breaches, disruption of critical services, or use of compromised devices as footholds for lateral movement within corporate networks. Since the attack requires physical proximity, organizations with employees using Windows 10 Version 1809 devices in public or semi-public environments (e.g., airports, train stations, cafes) are at higher risk. Additionally, industries with high mobility requirements or those using embedded Windows 10 1809 systems in specialized equipment may be vulnerable. The lack of available patches increases the window of exposure. Given that Windows 10 Version 1809 is an older OS version, organizations that have not upgraded or migrated to newer Windows versions remain exposed. The potential for high-impact compromise underscores the need for immediate attention, especially in sectors handling sensitive personal data or critical infrastructure, which are heavily regulated in Europe under GDPR and NIS Directive frameworks.
Mitigation Recommendations
1. Immediate mitigation should focus on reducing physical exposure of devices running Windows 10 Version 1809 with mobile broadband capabilities. Limit device usage in untrusted or public environments where attackers could gain proximity. 2. Implement network segmentation and strict access controls to isolate devices with mobile broadband drivers from sensitive internal networks, minimizing lateral movement if compromise occurs. 3. Monitor network traffic and device behavior for anomalies indicative of exploitation attempts, focusing on mobile broadband interfaces. 4. Enforce strict device management policies to identify and inventory all Windows 10 Version 1809 devices, prioritizing their upgrade or replacement. 5. Expedite migration to supported Windows versions with active security updates, as newer versions are less likely to be vulnerable. 6. Until patches are released, consider disabling or restricting the Windows Mobile Broadband Driver where feasible, especially on devices that do not require mobile broadband connectivity. 7. Educate users about the risks of using vulnerable devices in public or semi-public spaces and encourage reporting of suspicious device behavior. 8. Collaborate with mobile network providers to detect and mitigate suspicious activity at the network level that could be related to exploitation attempts. These targeted mitigations go beyond generic advice by focusing on the unique aspects of this vulnerability, such as physical proximity and mobile broadband driver usage.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-03-22T23:12:11.049Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9837c4522896dcbeb593
Added to database: 5/21/2025, 9:09:11 AM
Last enriched: 6/26/2025, 4:59:13 AM
Last updated: 8/1/2025, 12:35:05 PM
Views: 11
Related Threats
CVE-2025-8854: CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in bulletphysics bullet3
HighCVE-2025-8830: OS Command Injection in Linksys RE6250
MediumCVE-2025-54878: CWE-122: Heap-based Buffer Overflow in nasa CryptoLib
HighCVE-2025-40920: CWE-340 Generation of Predictable Numbers or Identifiers in ETHER Catalyst::Authentication::Credential::HTTP
HighCarmaker’s Portal Vulnerability Could Have Allowed Hackers to Unlock Vehicles and Access Data
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.