Skip to main content

CVE-2024-49101: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-49101cvecve-2024-49101cwe-125
Published: Tue Dec 10 2024 (12/10/2024, 17:49:16 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 20:40:15 UTC

Technical Analysis

CVE-2024-49101 is an elevation of privilege vulnerability identified in the Wireless Wide Area Network Service (WwanSvc) component of Microsoft Windows 10 Version 1809 (build 10.0.17763.0). The vulnerability is classified as an out-of-bounds read (CWE-125), which occurs when the software reads data outside the boundaries of allocated memory. This can lead to the exposure of sensitive information or cause the system to behave unpredictably. Specifically, the flaw exists within the WwanSvc service, which manages wireless wide area network connections, potentially allowing an attacker with limited privileges (local privileges) to exploit this vulnerability to elevate their privileges to a higher level on the affected system. The CVSS v3.1 base score is 6.6, indicating a medium severity level. The vector string (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C) reveals that the attack requires local access (AV:P), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was reserved in October 2024 and published in December 2024. Given the affected product is Windows 10 Version 1809, which is an older version of Windows 10, this vulnerability mainly impacts systems that have not been updated to newer Windows versions or have extended support agreements. The out-of-bounds read could be leveraged by an attacker to read sensitive memory contents, potentially leading to privilege escalation and full system compromise if combined with other vulnerabilities or attack vectors.

Potential Impact

For European organizations, the impact of CVE-2024-49101 can be significant, especially in environments where Windows 10 Version 1809 is still in use, such as legacy industrial control systems, government agencies, or enterprises with strict change management policies delaying upgrades. Successful exploitation could allow attackers to escalate privileges from a low-privileged user to SYSTEM level, enabling them to execute arbitrary code, install persistent malware, or access sensitive data. This could lead to data breaches, disruption of critical services, or lateral movement within networks. Given the high impact on confidentiality, integrity, and availability, organizations could face regulatory repercussions under GDPR if personal data is compromised. The lack of required user interaction and low attack complexity means that insider threats or attackers with limited access could exploit this vulnerability relatively easily. However, the requirement for local access limits remote exploitation, so the threat is more pronounced in environments where attackers can gain initial footholds or physical access.

Mitigation Recommendations

1. Upgrade affected systems to a supported and fully patched version of Windows 10 or later, as Windows 10 Version 1809 is out of mainstream support and may not receive security updates promptly. 2. Implement strict access controls and limit local user privileges to reduce the risk of privilege escalation. 3. Employ endpoint detection and response (EDR) solutions to monitor for unusual behavior related to WwanSvc or privilege escalation attempts. 4. Restrict physical and remote access to systems running Windows 10 Version 1809, ensuring only authorized personnel can log in locally. 5. Use application whitelisting and system hardening to reduce the attack surface. 6. Monitor security advisories from Microsoft for patches or workarounds related to this CVE and apply them promptly once available. 7. Conduct regular vulnerability assessments and penetration testing focusing on privilege escalation vectors. 8. Educate users and administrators about the risks of running outdated operating systems and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-10-11T20:57:49.204Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd6209

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 8:40:15 PM

Last updated: 7/31/2025, 3:17:43 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats