CVE-2024-49078: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
AI Analysis
Technical Summary
CVE-2024-49078 is a medium-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809, specifically the Mobile Broadband Driver component. The root cause is an integer overflow or wraparound condition (CWE-190) within the driver code. Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to memory corruption or logic errors. In this case, the overflow can be exploited to escalate privileges on the affected system. The vulnerability does not require user interaction or prior authentication, but it does require local access (attack vector: physical or logical local access). The CVSS v3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability if exploited. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, which is an older Windows 10 release. The Mobile Broadband Driver is responsible for managing cellular modem hardware, which is commonly used in laptops and mobile devices to provide cellular network connectivity. An attacker exploiting this vulnerability could gain elevated privileges, potentially allowing them to execute arbitrary code with higher system rights, bypass security controls, and compromise the system’s confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly to enterprises and government agencies that still operate legacy Windows 10 Version 1809 systems, especially on mobile or remote devices using cellular broadband connectivity. Successful exploitation could allow attackers to escalate privileges locally, enabling further lateral movement, installation of persistent malware, or data exfiltration. This could impact critical infrastructure, sensitive data environments, and regulated sectors such as finance, healthcare, and public administration. The lack of required user interaction and authentication increases the risk in environments where physical or logical access to devices is possible, such as shared workspaces or remote work scenarios. Although no exploits are currently known in the wild, the presence of this vulnerability in an older but still in-use OS version means organizations must assess their exposure and prioritize remediation to prevent potential future attacks.
Mitigation Recommendations
1. Immediate inventory and identification of all systems running Windows 10 Version 1809 (build 17763.0) with Mobile Broadband Driver enabled. 2. Apply any forthcoming Microsoft security updates or patches addressing CVE-2024-49078 as soon as they become available. 3. Where patching is not immediately possible, consider disabling the Mobile Broadband Driver or cellular modem hardware on affected devices if cellular connectivity is not essential. 4. Implement strict local access controls and endpoint security measures to prevent unauthorized physical or logical access to devices, including strong authentication and device encryption. 5. Monitor system logs and security telemetry for unusual privilege escalation attempts or driver-related anomalies. 6. For organizations using remote management, ensure that remote access solutions are secured and monitored to prevent attackers from leveraging local access vectors remotely. 7. Plan and execute an upgrade strategy to move affected systems off Windows 10 Version 1809 to supported and patched Windows versions to reduce exposure to legacy vulnerabilities.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2024-49078: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809
Description
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-49078 is a medium-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809, specifically the Mobile Broadband Driver component. The root cause is an integer overflow or wraparound condition (CWE-190) within the driver code. Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to memory corruption or logic errors. In this case, the overflow can be exploited to escalate privileges on the affected system. The vulnerability does not require user interaction or prior authentication, but it does require local access (attack vector: physical or logical local access). The CVSS v3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability if exploited. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, which is an older Windows 10 release. The Mobile Broadband Driver is responsible for managing cellular modem hardware, which is commonly used in laptops and mobile devices to provide cellular network connectivity. An attacker exploiting this vulnerability could gain elevated privileges, potentially allowing them to execute arbitrary code with higher system rights, bypass security controls, and compromise the system’s confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk particularly to enterprises and government agencies that still operate legacy Windows 10 Version 1809 systems, especially on mobile or remote devices using cellular broadband connectivity. Successful exploitation could allow attackers to escalate privileges locally, enabling further lateral movement, installation of persistent malware, or data exfiltration. This could impact critical infrastructure, sensitive data environments, and regulated sectors such as finance, healthcare, and public administration. The lack of required user interaction and authentication increases the risk in environments where physical or logical access to devices is possible, such as shared workspaces or remote work scenarios. Although no exploits are currently known in the wild, the presence of this vulnerability in an older but still in-use OS version means organizations must assess their exposure and prioritize remediation to prevent potential future attacks.
Mitigation Recommendations
1. Immediate inventory and identification of all systems running Windows 10 Version 1809 (build 17763.0) with Mobile Broadband Driver enabled. 2. Apply any forthcoming Microsoft security updates or patches addressing CVE-2024-49078 as soon as they become available. 3. Where patching is not immediately possible, consider disabling the Mobile Broadband Driver or cellular modem hardware on affected devices if cellular connectivity is not essential. 4. Implement strict local access controls and endpoint security measures to prevent unauthorized physical or logical access to devices, including strong authentication and device encryption. 5. Monitor system logs and security telemetry for unusual privilege escalation attempts or driver-related anomalies. 6. For organizations using remote management, ensure that remote access solutions are secured and monitored to prevent attackers from leveraging local access vectors remotely. 7. Plan and execute an upgrade strategy to move affected systems off Windows 10 Version 1809 to supported and patched Windows versions to reduce exposure to legacy vulnerabilities.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-10-11T20:57:49.196Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd6149
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/4/2025, 8:12:29 PM
Last updated: 7/27/2025, 7:48:48 AM
Views: 12
Related Threats
CVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.