Remote Code Execution Vulnerability in Windows Lightweight Directory Access Protocol
CVE-2024-49112
Key Information
- Vendor
- Microsoft
- Status
- Windows 10 Version 1809
- Windows Server 2019
- Windows Server 2019 (server Core Installation)
- Windows Server 2022
- Vendor
- CVE Published:
- 12 December 2024
What is CVE-2024-49112?
CVE-2024-49112 is a significant vulnerability affecting the Windows Lightweight Directory Access Protocol (LDAP), which is essential for directory services and enables applications to access and manage directory information over a network. This vulnerability allows for remote code execution, posing a critical threat to organizations that depend on LDAP for managing user authentication and directory services. If exploited, an attacker could gain unauthorized control over affected systems, resulting in serious operational disruption, data breaches, or unauthorized access to sensitive information.
Technical Details
CVE-2024-49112 allows remote attackers to execute arbitrary code on systems using vulnerable Windows LDAP implementations. The vulnerability arises from improper input validation and can be exploited through crafted requests sent to the LDAP service. Successful exploitation does not require authentication, making it particularly dangerous, as it allows attackers to potentially take over vulnerable machines without any user interaction.
Potential Impact of CVE-2024-49112
-
Unauthorized System Access: Attackers can gain control over affected systems remotely, enabling them to access sensitive data, modify files, or deploy malicious software, which can compromise the organizationโs security posture.
-
Data Breach: The vulnerability can lead to extensive data breaches, threatening the confidentiality and integrity of information stored on compromised systems, which could include personally identifiable information (PII) and proprietary business data.
-
Operational Disruption: Successful exploitation could result in significant downtime and operational disruptions, leading to potential financial losses, reputational damage, and recovery costs for affected organizations.
Affected Version(s)
Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20857
Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7606
Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.6659
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- ๐ฅ
Vulnerability reached the number 1 worldwide trending spot
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
- ๐
Vulnerability started trending
Vulnerability published
Vulnerability Reserved