CVE-2024-30004
📋 TL;DR
This vulnerability in the Windows Mobile Broadband Driver allows an attacker to execute arbitrary code remotely by sending specially crafted packets to an affected system. It affects Windows devices with mobile broadband hardware or drivers installed. Successful exploitation could lead to full system compromise.
💻 Affected Systems
- Windows 10
- Windows 11
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
📦 What is this software?
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with administrative privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.
Likely Case
Local privilege escalation leading to system compromise, potentially allowing lateral movement within networks.
If Mitigated
Limited impact due to network segmentation, patched systems, and restricted mobile broadband usage.
🎯 Exploit Status
Microsoft has not disclosed exploitation details; requires network access to vulnerable driver.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: May 2024 security updates (KB5037771 for Windows 11, KB5037768 for Windows 10, etc.)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30004
Restart Required: Yes
Instructions:
1. Apply May 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Verify installation via 'winver' command showing updated build numbers.
🔧 Temporary Workarounds
Disable Mobile Broadband Interface
windowsTemporarily disable vulnerable driver interface if mobile broadband is not required.
netsh mbn set conmode=disabled
Network Segmentation
allIsolate systems with mobile broadband hardware from untrusted networks.
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure to mobile broadband interfaces.
- Monitor for unusual network traffic patterns or driver-related process anomalies.
🔍 How to Verify
Check if Vulnerable:
Check Windows Update history for May 2024 security updates; if missing and mobile broadband hardware present, system is vulnerable.
Check Version:
winver
Verify Fix Applied:
Run 'winver' to confirm OS build number matches post-patch versions (e.g., Windows 11 build 22621.3593).
📡 Detection & Monitoring
Log Indicators:
- Event ID 1 from MbaeApi.exe with suspicious parameters
- Unexpected driver loads (netwmb.sys)
Network Indicators:
- Unusual traffic to/from mobile broadband interfaces
- Suspicious packets targeting port 500 (IKE) or mobile broadband protocols
SIEM Query:
EventID=1 AND ProcessName="MbaeApi.exe" | stats count by CommandLine