Skip to main content

CVE-2024-49109: CWE-125: Out-of-bounds Read in Microsoft Windows 10 Version 1809

Medium
VulnerabilityCVE-2024-49109cvecve-2024-49109cwe-125
Published: Tue Dec 10 2024 (12/10/2024, 17:49:43 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability

AI-Powered Analysis

AILast updated: 07/04/2025, 20:42:18 UTC

Technical Analysis

CVE-2024-49109 is a security vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the Wireless Wide Area Network Service (WwanSvc). The vulnerability is classified as an out-of-bounds read (CWE-125), which occurs when a program reads data outside the bounds of allocated memory. This flaw can lead to elevation of privilege, allowing an attacker with limited privileges to gain higher-level access on the affected system. The vulnerability has a CVSS 3.1 base score of 6.6, indicating a medium severity level. The vector string (CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C) reveals that the attack requires local access (AV:P), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability was reserved in October 2024 and published in December 2024. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability affects Windows 10 Version 1809 build 10.0.17763.0, which is an older version of Windows 10, nearing or past end-of-support status. The Wireless Wide Area Network Service manages WWAN devices such as cellular modems, which are often used in mobile or remote environments. An attacker exploiting this vulnerability could potentially execute code or commands with elevated privileges, compromising system confidentiality, integrity, and availability.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those still operating legacy Windows 10 Version 1809 systems, particularly in sectors relying on mobile broadband connectivity such as telecommunications, transportation, and field services. Successful exploitation could allow attackers to escalate privileges locally, potentially leading to full system compromise, data breaches, or disruption of critical services. The high impact on confidentiality, integrity, and availability means sensitive corporate or personal data could be exposed or altered, and operational capabilities could be disrupted. Given that no user interaction is required, the attack could be automated or executed stealthily by insiders or malware with limited privileges. Organizations with remote or mobile workforces using WWAN devices are particularly vulnerable. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once patches are released or if the vulnerability is reverse-engineered.

Mitigation Recommendations

European organizations should prioritize identifying and inventorying all systems running Windows 10 Version 1809, especially those utilizing WWAN services. Since no patch links are currently available, organizations should monitor Microsoft’s official security update channels closely for the release of a security update addressing CVE-2024-49109. In the interim, organizations should consider disabling the Wireless Wide Area Network Service on systems where it is not required to reduce the attack surface. Implement strict access controls and limit local user privileges to the minimum necessary to reduce the risk of privilege escalation. Employ endpoint detection and response (EDR) solutions to monitor for unusual local privilege escalation attempts. Network segmentation and restricting physical or remote access to vulnerable systems can further reduce risk. Additionally, organizations should plan to upgrade or migrate systems from Windows 10 Version 1809 to supported Windows versions to ensure continued security support.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-10-11T20:57:49.206Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9815c4522896dcbd624f

Added to database: 5/21/2025, 9:08:37 AM

Last enriched: 7/4/2025, 8:42:18 PM

Last updated: 8/18/2025, 11:30:23 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats