CVE-2024-21363

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running Microsoft Message Queuing (MSMQ) by sending specially crafted packets. It affects Windows systems with MSMQ enabled, particularly those exposed to untrusted networks. Attackers can gain SYSTEM-level privileges on compromised systems.

💻 Affected Systems

Products:
  • Microsoft Message Queuing (MSMQ)
Versions: All supported Windows versions with MSMQ enabled
Operating Systems: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows 11, Windows 10
Default Config Vulnerable: ✅ No
Notes: MSMQ is not enabled by default on Windows systems. Only systems where MSMQ has been explicitly installed/enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling lateral movement, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Initial foothold leading to privilege escalation, credential harvesting, and lateral movement within enterprise networks.

🟢

If Mitigated

Limited impact due to network segmentation, strict firewall rules, and disabled MSMQ service on non-essential systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. The vulnerability requires network access to MSMQ service (TCP port 1801 by default).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: February 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21363

Restart Required: Yes

Instructions:

1. Apply February 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS, SCCM, or Intune. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable MSMQ Service

windows

Stop and disable the Microsoft Message Queuing service if not required for business operations.

sc stop MSMQ
sc config MSMQ start= disabled

Block MSMQ Ports

windows

Block inbound traffic to MSMQ ports (TCP 1801, UDP 3527, UDP 1801) at network perimeter.

netsh advfirewall firewall add rule name="Block MSMQ" dir=in action=block protocol=TCP localport=1801
netsh advfirewall firewall add rule name="Block MSMQ UDP" dir=in action=block protocol=UDP localport=1801,3527

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MSMQ servers from untrusted networks
  • Deploy host-based firewalls to block inbound MSMQ traffic except from authorized sources

🔍 How to Verify

Check if Vulnerable:

Check if MSMQ service is running: 'sc query MSMQ' or 'Get-Service MSMQ' in PowerShell. If service exists and is running, system is potentially vulnerable.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify February 2024 security updates are installed via 'systeminfo' command or PowerShell: 'Get-HotFix -Id KB5034765' (example KB, check actual KB for your OS version).

📡 Detection & Monitoring

Log Indicators:

  • Unusual MSMQ service restarts
  • Failed MSMQ authentication attempts from unexpected sources
  • Windows Security Event ID 4688 for unexpected process creation

Network Indicators:

  • Unusual traffic to TCP port 1801 from external sources
  • MSMQ protocol anomalies in network traffic

SIEM Query:

Example: (source_port=1801 OR destination_port=1801) AND (protocol=TCP) AND (bytes_sent>1000000 OR bytes_received>1000000)

🔗 References

📤 Share & Export