Skip to main content

CVE-2024-49077: CWE-191: Integer Underflow (Wrap or Wraparound) in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-49077cvecve-2024-49077cwe-191cwe-125
Published: Tue Dec 10 2024 (12/10/2024, 17:49:38 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 20:12:18 UTC

Technical Analysis

CVE-2024-49077 is an elevation of privilege vulnerability affecting the Windows Mobile Broadband Driver in Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The root cause is an integer underflow (CWE-191), which occurs when an arithmetic operation causes a value to wrap around below its minimum representable value, potentially leading to unexpected behavior such as buffer overflows or memory corruption. This vulnerability can be exploited by an attacker with local access to the system, as the attack vector requires physical or logical access (Attack Vector: Physical). The vulnerability does not require user interaction or prior authentication, making it easier to exploit if access is obtained. Successful exploitation could allow an attacker to elevate their privileges, gaining higher-level system permissions, which could lead to full system compromise. The CVSS 3.1 base score is 6.8 (medium severity), reflecting the significant impact on confidentiality, integrity, and availability (all rated high), but limited by the physical access requirement. There are no known exploits in the wild as of the publication date (December 10, 2024), and no official patch links have been provided yet. The vulnerability affects a specific Windows 10 version (1809), which is an older release but may still be in use in some environments. The technical details indicate that the vulnerability was reserved in October 2024 and published shortly after, with enrichment from CISA, highlighting its recognition by US cybersecurity authorities.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to systems still running Windows 10 Version 1809, which may be found in legacy or industrial environments where upgrading is delayed. An attacker exploiting this vulnerability could gain elevated privileges on affected machines, potentially leading to unauthorized access to sensitive data, disruption of services, or deployment of further malware with high privileges. Given the high impact on confidentiality, integrity, and availability, critical infrastructure, government agencies, and enterprises handling sensitive data could face significant operational and reputational damage if exploited. However, the requirement for physical or local access limits remote exploitation, reducing the risk of widespread remote attacks. Nonetheless, insider threats or attackers with initial footholds could leverage this vulnerability to escalate privileges and move laterally within networks. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code may emerge once patches or mitigations are released.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying systems running Windows 10 Version 1809, especially those with Mobile Broadband Drivers installed. Since no official patches are currently linked, organizations should monitor Microsoft security advisories closely for updates or hotfixes addressing CVE-2024-49077. In the interim, applying strict access controls to limit physical and local access to vulnerable systems is critical. Employ endpoint protection solutions that can detect unusual privilege escalation attempts. Network segmentation can help contain potential lateral movement if an attacker exploits this vulnerability. Additionally, organizations should consider upgrading affected systems to supported Windows versions with active security updates to reduce exposure. Implementing strong logging and monitoring for privilege escalation indicators will aid in early detection of exploitation attempts. Finally, educating staff about the risks of unauthorized local access and enforcing policies to prevent use of unauthorized devices can further reduce risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-10-11T20:57:49.196Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd6145

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 8:12:18 PM

Last updated: 8/20/2025, 11:35:19 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats