CVE-2024-30004

6.8 MEDIUM

📋 TL;DR

This vulnerability in the Windows Mobile Broadband Driver allows an attacker to execute arbitrary code remotely by sending specially crafted packets to an affected system. It affects Windows devices with mobile broadband hardware or drivers installed. Successful exploitation could lead to full system compromise.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: All supported versions prior to May 2024 security updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires mobile broadband hardware/drivers; systems without these components are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to system compromise, potentially allowing lateral movement within networks.

🟢

If Mitigated

Limited impact due to network segmentation, patched systems, and restricted mobile broadband usage.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Microsoft has not disclosed exploitation details; requires network access to vulnerable driver.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2024 security updates (KB5037771 for Windows 11, KB5037768 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004

Restart Required: Yes

Instructions:

1. Apply May 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Verify installation via 'winver' command showing updated build numbers.

🔧 Temporary Workarounds

Disable Mobile Broadband Interface

windows

Temporarily disable vulnerable driver interface if mobile broadband is not required.

netsh mbn set conmode=disabled

Network Segmentation

all

Isolate systems with mobile broadband hardware from untrusted networks.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to mobile broadband interfaces.
  • Monitor for unusual network traffic patterns or driver-related process anomalies.

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for May 2024 security updates; if missing and mobile broadband hardware present, system is vulnerable.

Check Version:

winver

Verify Fix Applied:

Run 'winver' to confirm OS build number matches post-patch versions (e.g., Windows 11 build 22621.3593).

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1 from MbaeApi.exe with suspicious parameters
  • Unexpected driver loads (netwmb.sys)

Network Indicators:

  • Unusual traffic to/from mobile broadband interfaces
  • Suspicious packets targeting port 500 (IKE) or mobile broadband protocols

SIEM Query:

EventID=1 AND ProcessName="MbaeApi.exe" | stats count by CommandLine

🔗 References

📤 Share & Export