CVE-2024-30000

6.8 MEDIUM

📋 TL;DR

This vulnerability in the Windows Mobile Broadband Driver allows an attacker to execute arbitrary code remotely by sending specially crafted packets to an affected system. It affects Windows devices with mobile broadband hardware and drivers installed. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Windows Mobile Broadband Driver
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with mobile broadband hardware/drivers installed. Most servers and many desktops are not vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or remote code execution on vulnerable systems, potentially leading to lateral movement within networks.

🟢

If Mitigated

Limited impact due to network segmentation, endpoint protection, and lack of mobile broadband hardware in most enterprise environments.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to vulnerable system and knowledge of mobile broadband interface configuration.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2024 security updates (KB5037771 for Windows 11, KB5037768 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30000

Restart Required: Yes

Instructions:

1. Apply May 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Verify installation via winver or systeminfo command.

🔧 Temporary Workarounds

Disable Mobile Broadband Interface

windows

Disable mobile broadband network adapters if not needed

netsh mbn set profile name="*" connectionmode=manual
Disable in Device Manager: Network adapters -> Mobile Broadband

Network Segmentation

all

Isolate systems with mobile broadband hardware from critical networks

🧯 If You Can't Patch

  • Implement strict network segmentation for devices with mobile broadband hardware
  • Deploy endpoint detection and response (EDR) solutions to detect exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if mobile broadband drivers are installed via Device Manager or 'netsh mbn show interfaces' command

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2024 security updates are installed via 'systeminfo | findstr KB5037771' or similar for your OS version

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1 from MbaeApi.exe with suspicious command execution
  • Unexpected mobile broadband driver activity in System logs

Network Indicators:

  • Unusual traffic to/from mobile broadband interfaces
  • Suspicious packets to mobile broadband ports

SIEM Query:

DeviceLogs | where ProcessName contains "MbaeApi" and CommandLine contains suspicious patterns

🔗 References

📤 Share & Export