Skip to main content

CVE-2024-49078: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-49078cvecve-2024-49078cwe-190cwe-125
Published: Tue Dec 10 2024 (12/10/2024, 17:49:38 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 20:12:29 UTC

Technical Analysis

CVE-2024-49078 is a medium-severity elevation of privilege vulnerability affecting Microsoft Windows 10 Version 1809, specifically the Mobile Broadband Driver component. The root cause is an integer overflow or wraparound condition (CWE-190) within the driver code. Integer overflow vulnerabilities occur when an arithmetic operation attempts to create a numeric value that is outside the range that can be represented with a given number of bits, causing the value to wrap around and potentially leading to memory corruption or logic errors. In this case, the overflow can be exploited to escalate privileges on the affected system. The vulnerability does not require user interaction or prior authentication, but it does require local access (attack vector: physical or logical local access). The CVSS v3.1 base score is 6.8, reflecting a medium severity with high impact on confidentiality, integrity, and availability if exploited. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, which is an older Windows 10 release. The Mobile Broadband Driver is responsible for managing cellular modem hardware, which is commonly used in laptops and mobile devices to provide cellular network connectivity. An attacker exploiting this vulnerability could gain elevated privileges, potentially allowing them to execute arbitrary code with higher system rights, bypass security controls, and compromise the system’s confidentiality, integrity, and availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk particularly to enterprises and government agencies that still operate legacy Windows 10 Version 1809 systems, especially on mobile or remote devices using cellular broadband connectivity. Successful exploitation could allow attackers to escalate privileges locally, enabling further lateral movement, installation of persistent malware, or data exfiltration. This could impact critical infrastructure, sensitive data environments, and regulated sectors such as finance, healthcare, and public administration. The lack of required user interaction and authentication increases the risk in environments where physical or logical access to devices is possible, such as shared workspaces or remote work scenarios. Although no exploits are currently known in the wild, the presence of this vulnerability in an older but still in-use OS version means organizations must assess their exposure and prioritize remediation to prevent potential future attacks.

Mitigation Recommendations

1. Immediate inventory and identification of all systems running Windows 10 Version 1809 (build 17763.0) with Mobile Broadband Driver enabled. 2. Apply any forthcoming Microsoft security updates or patches addressing CVE-2024-49078 as soon as they become available. 3. Where patching is not immediately possible, consider disabling the Mobile Broadband Driver or cellular modem hardware on affected devices if cellular connectivity is not essential. 4. Implement strict local access controls and endpoint security measures to prevent unauthorized physical or logical access to devices, including strong authentication and device encryption. 5. Monitor system logs and security telemetry for unusual privilege escalation attempts or driver-related anomalies. 6. For organizations using remote management, ensure that remote access solutions are secured and monitored to prevent attackers from leveraging local access vectors remotely. 7. Plan and execute an upgrade strategy to move affected systems off Windows 10 Version 1809 to supported and patched Windows versions to reduce exposure to legacy vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-10-11T20:57:49.196Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd6149

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 8:12:29 PM

Last updated: 7/27/2025, 7:48:48 AM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats