Relative Path Traversal (CWE-23)
A vulnerability in the Windows Remote Desktop Licensing Service could allow an attacker to disclose sensitive information. This is a relative path traversal vulnerability, which means an attacker could potentially access files or directories that are outside of the intended directory structure.
An attacker exploiting this vulnerability could gain unauthorized access to sensitive information. The confidentiality impact is rated as HIGH, while integrity and availability impacts are NONE. This suggests that the primary risk is the exposure of sensitive data, rather than system modification or disruption. The vulnerability requires no user interaction and can be exploited remotely over a network with low attack complexity, making it relatively easy for attackers to take advantage of.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
A patch is available. Microsoft has released updates to address this vulnerability. The patch was added on September 10, 2024.
1. Apply the latest security updates provided by Microsoft as soon as possible. 2. Ensure that all affected Windows Server versions are updated to the following versions or later: - Windows Server 2022 23H2: 10.0.25398.1128 - Windows Server 2022: 10.0.20348.2700 - Windows Server 2019: 10.0.17763.6293 - Windows Server 2016: 10.0.14393.7336 3. If immediate patching is not possible, consider restricting network access to the Remote Desktop Licensing Service, especially from untrusted networks. 4. Monitor for any suspicious activities or unauthorized access attempts related to the Remote Desktop Licensing Service. 5. Implement the principle of least privilege for user accounts and services running on affected systems. 6. Keep systems and software up-to-date with the latest security patches as a general best practice.
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
Detection for the vulnerability has been added to Qualys (92169)
A CVSS base score of 6.5 has been assigned.
Feedly found the first article mentioning CVE-2024-38258. See article
NVD published the first details for CVE-2024-38258
Feedly estimated the CVSS score as MEDIUM
EPSS Score was set to: 0.05% (Percentile: 18.9%)
A CVSS base score of 7.5 has been assigned.
EPSS Score was set to: 0.1% (Percentile: 42.4%)