CVE-2024-30002

6.8 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems through the Mobile Broadband Driver. Attackers could exploit this by sending specially crafted packets to vulnerable systems, potentially gaining SYSTEM privileges. All Windows systems with mobile broadband functionality are affected.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2022
Versions: Multiple versions - check Microsoft advisory for specific affected builds
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with mobile broadband hardware/adapters are most vulnerable. Virtual machines without mobile broadband hardware may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains SYSTEM privileges and full control of the target system, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attacker executes code with SYSTEM privileges to install malware, steal credentials, or pivot to other systems on the network.

🟢

If Mitigated

Attack fails due to network segmentation, host-based firewalls blocking mobile broadband traffic, or exploit mitigations like ASLR/DEP.

🌐 Internet-Facing: MEDIUM - Requires mobile broadband interface exposure to internet, which is less common than standard network interfaces.
🏢 Internal Only: MEDIUM - Internal attackers could exploit if mobile broadband adapters are enabled and accessible on the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to mobile broadband interface. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft's May 2024 security updates for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Verify installation in Windows Update history.

🔧 Temporary Workarounds

Disable Mobile Broadband Adapter

windows

Disable mobile broadband network adapters to prevent exploitation

netsh mbn set conmode = disabled
Disable in Device Manager: Network adapters > Mobile Broadband

Block Mobile Broadband Network Traffic

windows

Use Windows Firewall to block inbound traffic to mobile broadband interfaces

New-NetFirewallRule -DisplayName "Block Mobile Broadband" -Direction Inbound -InterfaceAlias "*Mobile*" -Action Block

🧯 If You Can't Patch

  • Segment networks to isolate systems with mobile broadband adapters
  • Implement strict network access controls and monitor for unusual mobile broadband traffic

🔍 How to Verify

Check if Vulnerable:

Check Windows version and compare with Microsoft's affected versions list. Use: systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Check Version:

winver

Verify Fix Applied:

Verify Windows Update installed the May 2024 security updates. Check: Get-HotFix | where {$_.HotFixID -like "KB5*"}

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Unexpected driver crashes (Event ID 1001)
  • Security logs: Unexpected SYSTEM privilege processes

Network Indicators:

  • Unusual traffic to/from mobile broadband interfaces
  • Suspicious packets targeting mobile broadband ports

SIEM Query:

EventID=1001 AND Source="Windows Error Reporting" AND Description contains "mbn" OR EventID=4688 AND NewProcessName contains unusual SYSTEM processes

🔗 References

📤 Share & Export