Skip to main content

CVE-2024-49087: CWE-20: Improper Input Validation in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-49087cvecve-2024-49087cwe-20
Published: Tue Dec 10 2024 (12/10/2024, 17:49:11 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Mobile Broadband Driver Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 20:26:02 UTC

Technical Analysis

CVE-2024-49087 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Mobile Broadband Driver component. The vulnerability is classified under CWE-20, which pertains to improper input validation. This flaw allows an attacker with physical access to the system (as indicated by the CVSS vector AV:P - Physical) to cause an information disclosure without requiring any privileges or user interaction. The vulnerability arises because the Mobile Broadband Driver does not properly validate input data, potentially allowing sensitive information to be leaked from the system. The CVSS score of 4.6 reflects a moderate impact primarily on confidentiality, with no impact on integrity or availability. The vulnerability does not require authentication or user interaction, but the attacker must have physical access to the affected device. No known exploits are currently reported in the wild, and no official patches have been linked yet. The vulnerability affects Windows 10 Version 1809 (build 10.0.17763.0), which is an older but still in-use version of Windows 10, particularly in enterprise environments where long-term servicing branches are maintained. The improper input validation could allow attackers to extract sensitive driver or system information, which could be leveraged for further attacks or reconnaissance.

Potential Impact

For European organizations, the impact of CVE-2024-49087 is primarily related to confidentiality breaches on devices running Windows 10 Version 1809 with Mobile Broadband Drivers enabled. Since the attack vector requires physical access, the risk is higher in environments where devices are used in less controlled physical settings, such as field operations, mobile workforce, or shared workstations. Information disclosure could lead to leakage of sensitive system or network configuration details, potentially aiding attackers in crafting more targeted attacks. Organizations in sectors with high data sensitivity, such as finance, healthcare, and government, could face compliance and reputational risks if sensitive data is exposed. However, the lack of impact on integrity and availability limits the immediate operational disruption. The medium severity suggests that while the vulnerability should be addressed promptly, it is not an urgent critical risk unless combined with other vulnerabilities or threat vectors.

Mitigation Recommendations

To mitigate CVE-2024-49087, European organizations should: 1) Identify and inventory all devices running Windows 10 Version 1809, especially those with Mobile Broadband Drivers installed and active. 2) Restrict physical access to these devices through enhanced physical security controls such as locked rooms, secure storage, and access logging. 3) Monitor for updates from Microsoft and apply patches promptly once available, as no official patch links are currently provided. 4) Consider upgrading affected systems to newer Windows 10 versions or Windows 11, where this vulnerability is not present or has been addressed. 5) Implement endpoint security solutions that can detect unusual driver or system information access patterns. 6) Educate staff on the risks of leaving devices unattended in unsecured locations to reduce the risk of physical exploitation. 7) Use device encryption and secure boot features to limit the ability of attackers to extract sensitive information even with physical access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-10-11T20:57:49.199Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd619e

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 8:26:02 PM

Last updated: 8/2/2025, 4:20:59 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats