Skip to main content

CVE-2024-30021: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-30021cvecve-2024-30021cwe-190
Published: Tue May 14 2024 (05/14/2024, 16:57:13 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Remote Code Execution Vulnerability

AI-Powered Analysis

AILast updated: 06/26/2025, 04:57:17 UTC

Technical Analysis

CVE-2024-30021 is a security vulnerability identified in the Windows Mobile Broadband Driver component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified under CWE-190, which pertains to Integer Overflow or Wraparound issues. Specifically, this flaw arises when an integer value exceeds its maximum limit and wraps around, potentially leading to unexpected behavior in memory management or logic processing within the driver. Exploiting this vulnerability could allow an attacker to execute arbitrary code remotely without requiring any authentication or user interaction. The CVSS 3.1 base score of 6.8 indicates a medium severity level, with the vector string highlighting that the attack vector is physical (AV:P), attack complexity is low (AC:L), no privileges are required (PR:N), and no user interaction is needed (UI:N). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning successful exploitation could fully compromise the affected system. The vulnerability is currently not known to be exploited in the wild, and no patches or mitigations have been explicitly linked yet. The issue is specific to a legacy Windows 10 version (1809), which is still in use in some environments but has been superseded by newer releases. The Mobile Broadband Driver is responsible for managing cellular network connectivity, so this vulnerability could be triggered remotely via network interfaces related to mobile broadband communications. Given the nature of the flaw, an attacker could craft malicious network packets or data to trigger the integer overflow, leading to remote code execution on the target machine.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to those still operating legacy Windows 10 Version 1809 systems with Mobile Broadband capabilities enabled. Successful exploitation could lead to full system compromise, allowing attackers to steal sensitive data, disrupt operations, or move laterally within networks. Sectors relying on mobile broadband for connectivity, such as remote offices, field services, or critical infrastructure with cellular backup, are especially vulnerable. The high impact on confidentiality, integrity, and availability means that data breaches, ransomware deployment, or system outages could result. Since no user interaction or privileges are required, the attack surface is broad, increasing the likelihood of exploitation if attackers develop reliable exploit code. The lack of known exploits in the wild currently reduces immediate risk, but the presence of a publicly disclosed vulnerability may incentivize attackers to develop exploits. Organizations in Europe with regulatory requirements for data protection (e.g., GDPR) must consider the potential compliance implications of breaches stemming from this vulnerability.

Mitigation Recommendations

1. Immediate prioritization of upgrading affected systems from Windows 10 Version 1809 to a supported and patched Windows version (e.g., Windows 10 21H2 or later) to eliminate exposure. 2. If upgrading is not immediately feasible, disable the Mobile Broadband Driver or related services on affected systems to reduce the attack surface, especially if mobile broadband connectivity is not essential. 3. Implement network-level controls to restrict or monitor traffic related to mobile broadband interfaces, including filtering suspicious packets that could trigger the overflow. 4. Employ endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts targeting the Mobile Broadband Driver. 5. Maintain strict network segmentation to limit lateral movement if a device is compromised via this vulnerability. 6. Regularly audit and inventory systems to identify any remaining Windows 10 Version 1809 installations and prioritize remediation. 7. Stay alert for official patches or security advisories from Microsoft and apply them promptly once available. 8. Conduct targeted penetration testing or vulnerability scanning focusing on mobile broadband components to assess exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-03-22T23:12:12.403Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9837c4522896dcbeb63d

Added to database: 5/21/2025, 9:09:11 AM

Last enriched: 6/26/2025, 4:57:17 AM

Last updated: 8/16/2025, 1:31:52 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats