CVE-2024-30002
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Windows systems through the Mobile Broadband Driver. Attackers could exploit this by sending specially crafted packets to vulnerable systems, potentially gaining SYSTEM privileges. All Windows systems with mobile broadband functionality are affected.
💻 Affected Systems
- Windows 10
- Windows 11
- Windows Server 2022
📦 What is this software?
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Remote attacker gains SYSTEM privileges and full control of the target system, enabling data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Attacker executes code with SYSTEM privileges to install malware, steal credentials, or pivot to other systems on the network.
If Mitigated
Attack fails due to network segmentation, host-based firewalls blocking mobile broadband traffic, or exploit mitigations like ASLR/DEP.
🎯 Exploit Status
Exploitation requires network access to mobile broadband interface. No public exploit code available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft's May 2024 security updates for specific KB numbers
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30002
Restart Required: Yes
Instructions:
1. Apply latest Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Verify installation in Windows Update history.
🔧 Temporary Workarounds
Disable Mobile Broadband Adapter
windowsDisable mobile broadband network adapters to prevent exploitation
netsh mbn set conmode = disabled
Disable in Device Manager: Network adapters > Mobile Broadband
Block Mobile Broadband Network Traffic
windowsUse Windows Firewall to block inbound traffic to mobile broadband interfaces
New-NetFirewallRule -DisplayName "Block Mobile Broadband" -Direction Inbound -InterfaceAlias "*Mobile*" -Action Block
🧯 If You Can't Patch
- Segment networks to isolate systems with mobile broadband adapters
- Implement strict network access controls and monitor for unusual mobile broadband traffic
🔍 How to Verify
Check if Vulnerable:
Check Windows version and compare with Microsoft's affected versions list. Use: systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Check Version:
winver
Verify Fix Applied:
Verify Windows Update installed the May 2024 security updates. Check: Get-HotFix | where {$_.HotFixID -like "KB5*"}
📡 Detection & Monitoring
Log Indicators:
- Windows Event Logs: Unexpected driver crashes (Event ID 1001)
- Security logs: Unexpected SYSTEM privilege processes
Network Indicators:
- Unusual traffic to/from mobile broadband interfaces
- Suspicious packets targeting mobile broadband ports
SIEM Query:
EventID=1001 AND Source="Windows Error Reporting" AND Description contains "mbn" OR EventID=4688 AND NewProcessName contains unusual SYSTEM processes