CVE-2024-21347

7.5 HIGH

📋 TL;DR

This vulnerability in Microsoft ODBC Driver allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using vulnerable ODBC drivers for database connectivity. Systems with ODBC drivers exposed to untrusted input are at risk.

💻 Affected Systems

Products:
  • Microsoft ODBC Driver
Versions: Specific versions as listed in Microsoft advisory (check vendor advisory for exact versions)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Applications using ODBC drivers for database connectivity are vulnerable when processing untrusted input. The exact affected driver versions vary by release.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Application compromise leading to data exfiltration, privilege escalation, or service disruption for applications using vulnerable ODBC connections.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Microsoft rates this as 'Exploitation More Likely' in their advisory. The vulnerability requires the attacker to send specially crafted requests to a vulnerable ODBC endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Update Catalog for specific driver updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21347

Restart Required: Yes

Instructions:

1. Apply latest security updates from Microsoft
2. Update ODBC drivers to patched versions
3. Restart affected systems and applications
4. Verify patch installation

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to ODBC endpoints to only trusted sources

Use firewall rules to limit ODBC port access (typically TCP 1433 for SQL Server)

Input Validation

all

Implement strict input validation for all ODBC connection parameters

Application-level validation of ODBC connection strings and parameters

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure of ODBC endpoints
  • Monitor for unusual ODBC connection attempts and failed authentication events

🔍 How to Verify

Check if Vulnerable:

Check ODBC driver version against Microsoft's advisory. Use ODBC Data Source Administrator to view installed driver versions.

Check Version:

odbcad32.exe (Windows ODBC Data Source Administrator) or check registry at HKEY_LOCAL_MACHINE\SOFTWARE\ODBC\ODBCINST.INI

Verify Fix Applied:

Verify ODBC driver version has been updated to patched version. Check Windows Update history for security updates applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual ODBC connection attempts
  • Failed ODBC authentication events
  • Application crashes related to ODBC drivers

Network Indicators:

  • Unusual traffic to ODBC ports from unexpected sources
  • Malformed ODBC protocol packets

SIEM Query:

source="*odbc*" OR event_id=4625 (failed logon) AND process_name="*odbc*"

🔗 References

📤 Share & Export