CVE-2024-43537

6.5 MEDIUM

📋 TL;DR

This vulnerability in the Windows Mobile Broadband Driver allows attackers to cause a denial of service (system crash) by sending specially crafted requests. It affects Windows systems with mobile broadband hardware or drivers installed. Attackers need local access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Windows Mobile Broadband Driver
Versions: Multiple Windows versions as specified in Microsoft advisory
Operating Systems: Windows 10, Windows 11, Windows Server 2022, Windows Server 2019
Default Config Vulnerable: ✅ No
Notes: Only affects systems with mobile broadband hardware/drivers installed. Most servers and many desktops are not vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring reboot, potentially causing data loss or service disruption on affected systems.

🟠

Likely Case

Local denial of service resulting in system instability or crash, requiring manual intervention to restore functionality.

🟢

If Mitigated

Minimal impact with proper access controls and patching in place.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly reachable from internet.
🏢 Internal Only: MEDIUM - Internal attackers with local access could disrupt systems, but requires specific driver configuration.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of driver interaction. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest Windows security updates from Microsoft

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43537

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Check for updates. 3. Install all available security updates. 4. Restart system when prompted.

🔧 Temporary Workarounds

Disable Mobile Broadband Hardware

windows

Remove or disable mobile broadband hardware/drivers if not needed

Device Manager > Network adapters > Right-click mobile broadband device > Disable device

🧯 If You Can't Patch

  • Restrict local access to systems with mobile broadband hardware
  • Implement strict user privilege controls to limit who can interact with drivers

🔍 How to Verify

Check if Vulnerable:

Check if mobile broadband hardware is present in Device Manager under Network adapters

Check Version:

winver

Verify Fix Applied:

Verify Windows Update history shows latest security updates installed and system version matches patched versions

📡 Detection & Monitoring

Log Indicators:

  • System crash logs (Event ID 41)
  • Driver failure events in System logs
  • Unexpected system reboots

Network Indicators:

  • None - local exploitation only

SIEM Query:

EventID=41 OR (EventID=7034 AND Source="Service Control Manager" AND "Mobile Broadband" in Message)

🔗 References

📤 Share & Export