Skip to main content

CVE-2024-30005: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-30005cvecve-2024-30005cwe-190
Published: Tue May 14 2024 (05/14/2024, 16:57:05 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 04:58:52 UTC

Technical Analysis

CVE-2024-30005 is an integer overflow or wraparound vulnerability (CWE-190) affecting the Windows Mobile Broadband driver in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). This vulnerability arises due to improper handling of integer values within the driver code, which can lead to an overflow condition. Such an overflow can cause memory corruption, potentially allowing an attacker to execute arbitrary code remotely. The vulnerability is exploitable without requiring user interaction or privileges, but it requires local network access (AV:P - adjacent network). The CVSS 3.1 base score is 6.8, indicating a medium severity level, with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability is significant because the Mobile Broadband driver handles cellular network communications, which are often used in enterprise and mobile environments. An attacker exploiting this flaw could remotely execute code, potentially gaining control over affected systems, leading to data breaches, system compromise, or denial of service. The flaw’s presence in Windows 10 Version 1809, an older but still in-use version, means that organizations not updated to newer Windows versions remain vulnerable. The lack of required privileges and user interaction increases the risk, especially in environments where devices connect to untrusted or semi-trusted cellular networks or adjacent networks. The vulnerability's exploitation vector is limited to adjacent networks, which somewhat reduces the attack surface compared to internet-wide remote exploits but still poses a threat in enterprise or public network scenarios.

Potential Impact

For European organizations, this vulnerability poses a moderate risk, particularly for those still operating Windows 10 Version 1809 systems with Mobile Broadband capabilities enabled. Sectors relying on mobile broadband connectivity, such as transportation, logistics, field services, and remote workforce environments, are at higher risk. Successful exploitation could lead to unauthorized remote code execution, compromising sensitive data confidentiality, integrity, and availability. This could result in data breaches, operational disruptions, and potential lateral movement within corporate networks. Given the medium CVSS score but high impact on core security properties, organizations could face significant operational and reputational damage if exploited. The lack of known exploits currently provides a window for proactive mitigation. However, the adjacency requirement means that attackers need network proximity, which is plausible in shared or public cellular network environments common in Europe. Additionally, critical infrastructure and government agencies using legacy Windows 10 versions may be targeted due to the strategic value of their data and systems.

Mitigation Recommendations

1. Upgrade affected systems from Windows 10 Version 1809 to a supported and patched Windows version where this vulnerability is resolved. 2. If upgrading is not immediately feasible, disable or restrict the use of Mobile Broadband drivers and related services on vulnerable systems, especially in environments where cellular connectivity is not essential. 3. Implement network segmentation to isolate devices with Mobile Broadband capabilities from sensitive internal networks, limiting adjacency-based attack vectors. 4. Monitor network traffic for unusual activity on cellular interfaces and adjacent network connections to detect potential exploitation attempts. 5. Apply strict access controls and endpoint protection solutions that can detect anomalous behavior indicative of exploitation attempts. 6. Maintain up-to-date inventory of devices running Windows 10 Version 1809 and prioritize patching or mitigation on those with Mobile Broadband enabled. 7. Educate IT staff about this specific vulnerability to ensure rapid response once patches become available. 8. Engage with Microsoft security advisories regularly to obtain and deploy patches as soon as they are released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:11.049Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb597

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:58:52 AM

Last updated: 8/14/2025, 11:09:57 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats