CVE-2024-29048

8.8 HIGH

📋 TL;DR

This vulnerability in Microsoft OLE DB Driver for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects applications using the vulnerable driver to connect to SQL Server databases. Attackers could potentially take full control of the target system.

💻 Affected Systems

Products:
  • Microsoft OLE DB Driver for SQL Server
Versions: Multiple versions - check Microsoft advisory for specific affected versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Applications using the vulnerable OLE DB driver to connect to SQL Server are affected regardless of SQL Server version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining SYSTEM/administrator privileges, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to data theft, credential harvesting, and installation of backdoors or malware on vulnerable servers.

🟢

If Mitigated

Limited impact with proper network segmentation, application allowlisting, and least privilege principles in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to be able to send specially crafted requests to an application using the vulnerable driver.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update Guide for specific patched versions

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29048

Restart Required: Yes

Instructions:

1. Apply the latest security updates from Microsoft
2. Update Microsoft OLE DB Driver for SQL Server to the latest version
3. Restart affected systems and applications

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to SQL Server instances and applications using OLE DB driver

Application Control

windows

Implement application allowlisting to prevent unauthorized code execution

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to SQL Server instances
  • Apply the principle of least privilege to service accounts and user permissions

🔍 How to Verify

Check if Vulnerable:

Check installed OLE DB Driver version and compare with Microsoft's advisory for affected versions

Check Version:

Check via Windows Programs and Features or registry: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\MSOLEDBSQL

Verify Fix Applied:

Verify OLE DB Driver version has been updated to a patched version listed in Microsoft's advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL connection attempts
  • Failed authentication attempts to SQL Server
  • Process creation from SQL-related services

Network Indicators:

  • Unusual network traffic to SQL Server ports (default 1433)
  • Anomalous SQL protocol patterns

SIEM Query:

Example: source="*sql*" AND (event_id=4625 OR process_name="sqlservr.exe") AND dest_port=1433

🔗 References

📤 Share & Export