CVE-2024-30006

8.8 HIGH

📋 TL;DR

This vulnerability in Microsoft's WDAC OLE DB provider for SQL Server allows remote attackers to execute arbitrary code on affected systems by sending specially crafted requests. It affects systems running vulnerable versions of SQL Server with the WDAC OLE DB provider enabled. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Microsoft SQL Server
Versions: Specific versions listed in Microsoft advisory (typically recent versions before patching)
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WDAC OLE DB provider to be enabled and accessible

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, data exfiltration, lateral movement across network, and persistent backdoor installation.

🟠

Likely Case

Attacker gains code execution with SQL Server service account privileges, potentially leading to database compromise, credential theft, and further network exploitation.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring preventing successful exploitation or containing damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires network access to SQL Server and ability to send crafted OLE DB requests

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft Security Update for specific version

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30006

Restart Required: Yes

Instructions:

1. Apply latest Microsoft SQL Server security update from Windows Update or Microsoft Update Catalog. 2. Restart SQL Server services. 3. Verify patch installation.

🔧 Temporary Workarounds

Disable WDAC OLE DB provider

windows

Temporarily disable the vulnerable component if not required

SQL Server Configuration Manager: Disable OLE DB provider features

Network segmentation

all

Restrict network access to SQL Server ports

Firewall rules to limit SQL Server port access to trusted hosts only

🧯 If You Can't Patch

  • Implement strict network access controls to limit SQL Server exposure
  • Enable enhanced logging and monitoring for suspicious OLE DB activity

🔍 How to Verify

Check if Vulnerable:

Check SQL Server version against Microsoft's affected versions list in advisory

Check Version:

SELECT @@VERSION; in SQL Server Management Studio

Verify Fix Applied:

Verify SQL Server version is updated to patched version and check Windows Update history

📡 Detection & Monitoring

Log Indicators:

  • Unusual OLE DB provider activity
  • Failed authentication attempts to SQL Server
  • Suspicious process creation from SQL Server service

Network Indicators:

  • Unusual traffic patterns to SQL Server ports
  • Malformed OLE DB requests

SIEM Query:

Example: Source="SQL Server" AND (EventID=18456 OR EventID=18453) AND Process="oledb*"

🔗 References

📤 Share & Export