CVE-2024-38072

NULL Pointer Dereference (CWE-476)

Published: Jul 9, 2024

010
CVSS 7.5EPSS 0.05%High
CVE info copied to clipboard

Summary

A vulnerability in the Windows Remote Desktop Licensing Service could allow an attacker to cause a denial of service condition. This vulnerability is classified as a NULL Pointer Dereference (CWE-476). The attack vector is through the network, requires low attack complexity, and does not need user interaction or privileges.

Impact

If successfully exploited, this vulnerability could lead to a high impact on the availability of the affected system. The attack could cause the Windows Remote Desktop Licensing Service to crash or become unresponsive, potentially disrupting remote desktop services across the organization. However, there is no impact on the confidentiality or integrity of the system.

Exploitation

There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.

Patch

A patch is available. Microsoft released an update to address this vulnerability on July 9, 2024.

Mitigation

To mitigate this vulnerability, it is recommended to apply the security update provided by Microsoft as soon as possible. Prioritize patching for systems running Windows Server that have the Remote Desktop Licensing Service enabled. Additionally, network segmentation and access controls can be implemented to limit exposure of the affected service to untrusted networks.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Timeline

Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (92149)

Jul 9, 2024 at 7:53 AM
CVSS

A CVSS base score of 7.5 has been assigned.

Jul 9, 2024 at 5:05 PM / microsoft
CVE Assignment

NVD published the first details for CVE-2024-38072

Jul 9, 2024 at 5:15 PM
First Article

Feedly found the first article mentioning CVE-2024-38072. See article

Jul 9, 2024 at 5:24 PM / National Vulnerability Database
CVSS Estimate

Feedly estimated the CVSS score as MEDIUM

Jul 9, 2024 at 5:25 PM
Trending

This CVE started to trend in security discussions

Jul 9, 2024 at 7:13 PM
EPSS

EPSS Score was set to: 0.05% (Percentile: 17.2%)

Jul 10, 2024 at 10:14 AM
Trending

This CVE stopped trending in security discussions

Jul 12, 2024 at 6:08 PM
Threat Intelligence Report

CVE-2024-38072 is a critical Denial of Service vulnerability in the Windows Remote Desktop Licensing Service. It has a CVSS score of [insert score here]. The vulnerability is currently being exploited in the wild by [insert threat actor here], and there are no known mitigations or patches available at this time. Third-party vendors relying on this service may also be impacted. See article

Aug 11, 2024 at 1:46 PM
Static CVE Timeline Graph

Affected Systems

Microsoft/windows_server_2019
+null more

Patches

Microsoft
+null more

References

CVE-2024-38077 : A Zero-Click RCE Threat In Windows Server 2025
These vulnerabilities can be used to build multiple Preauth RCE exploitations targeting the Windows Remote Desktop Licensing Service. Among them were several Preauth RCE vulnerabilities (Unauthenticated non-sandboxed 0-click RCE) in the Remote Desktop Licensing Service.

News

CVE-2024-38077 : A Zero-Click RCE Threat In Windows Server 2025
These vulnerabilities can be used to build multiple Preauth RCE exploitations targeting the Windows Remote Desktop Licensing Service. Among them were several Preauth RCE vulnerabilities (Unauthenticated non-sandboxed 0-click RCE) in the Remote Desktop Licensing Service.
CVE-2024-38077.md
from impacket.dcerpc.v5.dtypes import BOOL,ULONG, DWORD, PULONG, PWCHAR, PBYTE, WIDESTR, UCHAR, WORD, BBYTE, LPSTR, PUINT, WCHAR These vulnerabilities can be used to build multiple Preauth RCE exploitations targeting the Windows Remote Desktop Licensing Service.
Microsoft’s Security Update in July of High-Risk Vulnerabilities in Multiple Products
On July 10, NSFOCUS CERT detected that Microsoft released a security update patch for July, which fixed 139 security issues involving Windows, Microsoft SQL Server, Microsoft Office, Azure and other widely used products, including high-risk vulnerabilities such as privilege escalation and remote code execution. Due to the heap-based buffer overflow in the Windows remote desktop authorization service, unauthenticated attackers can send special packets to the server set as the remote desktop authorization server, triggering the buffer overflow and executing arbitrary codes on the target system.
Microsoft Security Bulletin Coverage for July 2024
The SonicWall Capture Lab’s threat research team has analyzed and addressed Microsoft’s security advisories for the month of July 2024 and has produced coverage for 7 of the reported vulnerabilities. Microsoft’s July 2024 Patch Tuesday has 138 vulnerabilities, 59 of which are Remote Code Execution.
July Patch Tuesday Unleashes a Torrent of Updates – Sophos News
The Microsoft SQL Server Native Client component of this month’s update will fix 38 distinct remote code execution bugs in the OLE database driver. Microsoft rates five of the RCE vulnerabilities at the highest severity level of “critical,” including bugs that affect SharePoint Server, Windows Remote Desktop Licensing Service, and the Windows Codec library.
See 10 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:None
Integrity:None
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI