Remote Code Execution Vulnerability in Windows Lightweight Directory Access Protocol

CVE-2024-49112

9.8CRITICAL

Key Information

Vendor
Microsoft
Status
Windows 10 Version 1809
Windows Server 2019
Windows Server 2019 (server Core Installation)
Windows Server 2022
Vendor
CVE Published:
12 December 2024
๐Ÿฅ‡ Trended No. 1๐Ÿ“ˆ Trended๐Ÿ“ˆ Score: 16,900๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2024-49112?

CVE-2024-49112 is a significant vulnerability affecting the Windows Lightweight Directory Access Protocol (LDAP), which is essential for directory services and enables applications to access and manage directory information over a network. This vulnerability allows for remote code execution, posing a critical threat to organizations that depend on LDAP for managing user authentication and directory services. If exploited, an attacker could gain unauthorized control over affected systems, resulting in serious operational disruption, data breaches, or unauthorized access to sensitive information.

Technical Details

CVE-2024-49112 allows remote attackers to execute arbitrary code on systems using vulnerable Windows LDAP implementations. The vulnerability arises from improper input validation and can be exploited through crafted requests sent to the LDAP service. Successful exploitation does not require authentication, making it particularly dangerous, as it allows attackers to potentially take over vulnerable machines without any user interaction.

Potential Impact of CVE-2024-49112

  1. Unauthorized System Access: Attackers can gain control over affected systems remotely, enabling them to access sensitive data, modify files, or deploy malicious software, which can compromise the organizationโ€™s security posture.

  2. Data Breach: The vulnerability can lead to extensive data breaches, threatening the confidentiality and integrity of information stored on compromised systems, which could include personally identifiable information (PII) and proprietary business data.

  3. Operational Disruption: Successful exploitation could result in significant downtime and operational disruptions, leading to potential financial losses, reputational damage, and recovery costs for affected organizations.

Affected Version(s)

Windows 10 Version 1507 32-bit Systems 10.0.10240.0 < 10.0.10240.20857

Windows 10 Version 1607 32-bit Systems 10.0.14393.0 < 10.0.14393.7606

Windows 10 Version 1809 32-bit Systems 10.0.17763.0 < 10.0.17763.6659

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • ๐Ÿฅ‡

    Vulnerability reached the number 1 worldwide trending spot

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • ๐Ÿ“ˆ

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseMicrosoft Feed3 Proof of Concept(s)
.