CVE-2024-21405

7.0 HIGH

📋 TL;DR

This vulnerability in Microsoft Message Queuing (MSMQ) allows an authenticated attacker to execute code with SYSTEM privileges on affected systems. It affects Windows servers and workstations running MSMQ. Attackers must have valid credentials and network access to the target system.

💻 Affected Systems

Products:
  • Microsoft Message Queuing (MSMQ)
Versions: All supported versions of Windows Server and Windows client operating systems
Operating Systems: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Default Config Vulnerable: ✅ No
Notes: MSMQ is not installed by default on Windows systems. Only systems with MSMQ feature enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling lateral movement, data theft, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation from authenticated user to SYSTEM, allowing installation of malware, credential harvesting, and persistence mechanisms.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication controls, and minimal user privileges.

🌐 Internet-Facing: MEDIUM - Requires authentication but could be exploited if MSMQ is exposed to internet with valid credentials.
🏢 Internal Only: HIGH - Internal attackers with valid credentials can exploit this for privilege escalation and lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the target system. No public exploit code available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21405

Restart Required: Yes

Instructions:

1. Apply March 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable MSMQ Service

windows

Stop and disable the Message Queuing service if not required

sc stop MSMQ
sc config MSMQ start= disabled

Remove MSMQ Feature

windows

Uninstall the Message Queuing Windows feature

Disable-WindowsOptionalFeature -Online -FeatureName MSMQ-Server (PowerShell)
dism /online /disable-feature /featurename:MSMQ-Server (Command Prompt)

🧯 If You Can't Patch

  • Disable MSMQ service on all systems where it's not required
  • Implement network segmentation to restrict access to MSMQ ports (TCP 1801, TCP 2103, TCP 2105, UDP 3527)

🔍 How to Verify

Check if Vulnerable:

Check if MSMQ service is running: Get-Service MSMQ (PowerShell) or sc query MSMQ (Command Prompt)

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify March 2024 security updates are installed: Get-HotFix -Id KB5035857 (PowerShell) or wmic qfe list brief (Command Prompt)

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with MSMQ process creation
  • Unusual MSMQ service activity
  • Failed authentication attempts to MSMQ

Network Indicators:

  • Unusual traffic to MSMQ ports (1801, 2103, 2105, 3527)
  • Multiple connection attempts to MSMQ from single source

SIEM Query:

source="windows" AND (process_name="mqsvc.exe" OR service="MSMQ") AND (event_id=4688 OR event_id=7045)

🔗 References

📤 Share & Export