CVE-2024-49109: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
AI Analysis
Technical Summary
CVE-2024-49109 is a security vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Wireless Wide Area Network Service (WwanSvc). The vulnerability is classified as an out-of-bounds read (CWE-125), which occurs when a program reads data outside the bounds of allocated memory. This flaw can lead to elevation of privilege, allowing an attacker with limited privileges to gain higher-level access on the affected system. The vulnerability has a CVSS 3.1 base score of 6.6, indicating a medium severity level. The vector string (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C) reveals that the attack requires local access (AV:P), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability was reserved in October 2024 and published in December 2024. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, which is an older version of Windows 10, nearing or past end-of-support status. The Wireless Wide Area Network Service manages WWAN devices such as cellular modems, which are often used in mobile or remote environments. An attacker exploiting this vulnerability could potentially execute code or commands with elevated privileges, compromising system confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those still operating legacy Windows 10 Version 1809 systems, particularly in sectors relying on mobile broadband connectivity such as telecommunications, transportation, and field services. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to full system compromise, data breaches, or disruption of critical services. The high impact on confidentiality, integrity, and availability means sensitive corporate or personal data could be exposed or altered, and operational capabilities could be disrupted. Given that no user interaction is required, the attack could be automated or executed stealthily by insiders or malware with limited privileges. Organizations with remote or mobile workforces using WWAN devices are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released or if the vulnerability is reverse-engineered.
Mitigation Recommendations
European organizations should prioritize identifying and inventorying all systems running Windows 10 Version 1809, especially those utilizing WWAN services. Since no patch links are currently available, organizations should monitor Microsoft’s official security update channels closely for the release of a security update addressing CVE-2024-49109. In the interim, organizations should consider disabling the Wireless Wide Area Network Service on systems where it is not required to reduce the attack surface. Implement strict access controls and limit local user privileges to the minimum necessary to reduce the risk of privilege escalation. Employ endpoint detection and response (EDR) solutions to monitor for unusual local privilege escalation attempts. Network segmentation and restricting physical or remote access to vulnerable systems can further reduce risk. Additionally, organizations should plan to upgrade or migrate systems from Windows 10 Version 1809 to supported Windows versions to ensure continued security support.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Finland
CVE-2024-49109: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809
Description
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2024-49109 is a security vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Wireless Wide Area Network Service (WwanSvc). The vulnerability is classified as an out-of-bounds read (CWE-125), which occurs when a program reads data outside the bounds of allocated memory. This flaw can lead to elevation of privilege, allowing an attacker with limited privileges to gain higher-level access on the affected system. The vulnerability has a CVSS 3.1 base score of 6.6, indicating a medium severity level. The vector string (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C) reveals that the attack requires local access (AV:P), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability was reserved in October 2024 and published in December 2024. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, which is an older version of Windows 10, nearing or past end-of-support status. The Wireless Wide Area Network Service manages WWAN devices such as cellular modems, which are often used in mobile or remote environments. An attacker exploiting this vulnerability could potentially execute code or commands with elevated privileges, compromising system confidentiality, integrity, and availability.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially to those still operating legacy Windows 10 Version 1809 systems, particularly in sectors relying on mobile broadband connectivity such as telecommunications, transportation, and field services. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to full system compromise, data breaches, or disruption of critical services. The high impact on confidentiality, integrity, and availability means sensitive corporate or personal data could be exposed or altered, and operational capabilities could be disrupted. Given that no user interaction is required, the attack could be automated or executed stealthily by insiders or malware with limited privileges. Organizations with remote or mobile workforces using WWAN devices are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released or if the vulnerability is reverse-engineered.
Mitigation Recommendations
European organizations should prioritize identifying and inventorying all systems running Windows 10 Version 1809, especially those utilizing WWAN services. Since no patch links are currently available, organizations should monitor Microsoft’s official security update channels closely for the release of a security update addressing CVE-2024-49109. In the interim, organizations should consider disabling the Wireless Wide Area Network Service on systems where it is not required to reduce the attack surface. Implement strict access controls and limit local user privileges to the minimum necessary to reduce the risk of privilege escalation. Employ endpoint detection and response (EDR) solutions to monitor for unusual local privilege escalation attempts. Network segmentation and restricting physical or remote access to vulnerable systems can further reduce risk. Additionally, organizations should plan to upgrade or migrate systems from Windows 10 Version 1809 to supported Windows versions to ensure continued security support.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2024-10-11T20:57:49.206Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd624f
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/4/2025, 8:42:18 PM
Last updated: 8/18/2025, 11:30:23 PM
Views: 13
Related Threats
CVE-2025-8289: CWE-502 Deserialization of Untrusted Data in themeisle Redirection for Contact Form 7
HighCVE-2025-8145: CWE-502 Deserialization of Untrusted Data in themeisle Redirection for Contact Form 7
HighCVE-2025-8141: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in themeisle Redirection for Contact Form 7
HighCVE-2025-9132: Out of bounds write in Google Chrome
UnknownCVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.