CVE-2024-29995

8.1 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to elevate privileges on Windows systems by exploiting a flaw in the Kerberos authentication protocol. Attackers can gain higher-level permissions than originally granted, potentially compromising domain controllers or sensitive systems. All Windows systems using Kerberos authentication are affected.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems must have Kerberos authentication enabled and be joined to a domain. Standalone systems not using domain authentication are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete domain compromise where attackers gain Domain Admin privileges, enabling lateral movement, credential theft, and persistent access across the entire network.

🟠

Likely Case

Local privilege escalation on individual systems, allowing attackers to execute code with SYSTEM privileges, install malware, or access sensitive data.

🟢

If Mitigated

Limited impact with proper network segmentation, least privilege principles, and monitoring in place, potentially containing the attack to isolated segments.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires an authenticated attacker with valid domain credentials. The attacker must already have access to the target system or network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2024 security updates (KB5036893 for Windows 11, KB5036892 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-29995

Restart Required: Yes

Instructions:

1. Apply the April 2024 security updates from Windows Update. 2. For enterprise environments, deploy updates via WSUS, SCCM, or Intune. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Restrict Kerberos delegation

windows

Limit constrained and unconstrained delegation to reduce attack surface.

Use Active Directory tools to review and restrict delegation settings

Implement network segmentation

all

Segment domain controllers and critical systems from general user networks.

🧯 If You Can't Patch

  • Implement strict least privilege access controls and monitor for unusual privilege escalation attempts.
  • Deploy enhanced monitoring and detection for Kerberos authentication anomalies and suspicious ticket requests.

🔍 How to Verify

Check if Vulnerable:

Check if April 2024 security updates are installed via 'systeminfo' command or Windows Update history.

Check Version:

wmic qfe list | findstr KB5036893

Verify Fix Applied:

Verify KB5036893 (Windows 11) or KB5036892 (Windows 10) or equivalent Server updates are installed.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4769 (Kerberos service ticket requests) with unusual patterns
  • Multiple failed authentication attempts followed by successful privilege escalation

Network Indicators:

  • Unusual Kerberos ticket requests from non-standard sources
  • Anomalous traffic to domain controllers on port 88

SIEM Query:

source="windows-security" EventCode=4769 | stats count by AccountName, ClientAddress | where count > threshold

🔗 References

📤 Share & Export