Skip to main content

CVE-2024-49099: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-49099cvecve-2024-49099cwe-125
Published: Tue Dec 10 2024 (12/10/2024, 17:49:16 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 20:39:54 UTC

Technical Analysis

CVE-2024-49099 is a medium-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Windows Wireless Wide Area Network Service (WwanSvc). The vulnerability is classified as an out-of-bounds read (CWE-125), which occurs when the software reads data outside the bounds of allocated memory. This flaw can lead to information disclosure, as it allows an attacker with limited privileges (local privileges required) to read sensitive information from memory that should not be accessible. The vulnerability does not require user interaction and has a low attack vector, meaning it requires local access to the vulnerable system. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact (high), while integrity and availability remain unaffected. The vulnerability does not have known exploits in the wild as of the published date (December 10, 2024). The affected version is Windows 10 Version 1809 (build 10.0.17763.0), which is an older release of Windows 10. The vulnerability could be leveraged by an attacker who has local access and some privileges to the system to extract sensitive information from memory, potentially leading to further attacks or data leakage. No official patch links are provided yet, indicating that remediation might still be pending or in progress.

Potential Impact

For European organizations, the impact of CVE-2024-49099 depends largely on the presence of Windows 10 Version 1809 in their IT environment. Many enterprises have moved to newer Windows versions, but legacy systems, especially in industrial, governmental, or specialized sectors, may still run this version. The information disclosure could expose sensitive data such as credentials, configuration details, or other protected information residing in memory. This could facilitate lateral movement, privilege escalation, or targeted attacks. Confidentiality breaches could lead to compliance issues under GDPR, especially if personal or sensitive data is exposed. The requirement for local privileges limits remote exploitation, but insider threats or compromised local accounts could exploit this vulnerability. The lack of integrity or availability impact reduces the risk of system disruption but does not diminish the importance of protecting sensitive information. Overall, the vulnerability poses a moderate risk to confidentiality and could be a stepping stone in multi-stage attacks against European organizations.

Mitigation Recommendations

1. Prioritize upgrading or patching systems running Windows 10 Version 1809 to a supported and updated Windows version where this vulnerability is addressed. 2. Implement strict access controls and monitoring on systems that still run this legacy version to limit local user privileges and detect suspicious activities. 3. Employ endpoint detection and response (EDR) solutions to identify anomalous behavior indicative of exploitation attempts. 4. Conduct regular audits of user accounts and permissions to minimize the risk of insider threats or unauthorized local access. 5. Use network segmentation to isolate legacy systems from critical infrastructure and sensitive data repositories. 6. Until patches are available, consider disabling or restricting the Windows Wireless Wide Area Network Service (WwanSvc) if it is not essential for business operations, to reduce the attack surface. 7. Educate IT staff about this vulnerability and ensure incident response plans include steps for handling potential information disclosure incidents related to this flaw.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-10-11T20:57:49.204Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd6201

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 8:39:54 PM

Last updated: 8/17/2025, 9:46:17 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats