CVE-2024-30009

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running the Routing and Remote Access Service (RRAS) without authentication. Attackers can exploit this flaw by sending specially crafted packets to vulnerable RRAS servers. This affects Windows servers and workstations with RRAS enabled.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service (RRAS)
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only systems with RRAS enabled are vulnerable. RRAS is not enabled by default on most Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to domain takeover, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Initial foothold on vulnerable systems leading to privilege escalation, credential harvesting, and installation of backdoors or malware.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring preventing successful exploitation or containing the breach.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has rated this as 'Exploitation More Likely' in their advisory. The vulnerability requires no authentication and has low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30009

Restart Required: Yes

Instructions:

1. Apply the May 2024 Windows security updates from Microsoft. 2. Restart the system to complete the installation. 3. Verify the patch is applied using Windows Update history or system version checks.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Disable the Routing and Remote Access Service if not required for business operations.

sc config RemoteAccess start= disabled
sc stop RemoteAccess

Block RRAS Ports

all

Block network access to RRAS ports (TCP 1723, UDP 1701, UDP 500, UDP 4500) at firewalls.

🧯 If You Can't Patch

  • Disable RRAS service immediately if not required
  • Implement strict network segmentation to isolate RRAS servers from critical assets

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: 'sc query RemoteAccess' and verify Windows version is unpatched.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2024 security updates are installed via Windows Update history or check system version with 'systeminfo' command.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 for unexpected process creation
  • Event ID 4625 for failed authentication attempts to RRAS
  • Windows Security logs showing exploitation attempts

Network Indicators:

  • Unusual traffic to RRAS ports (1723, 1701, 500, 4500) from unexpected sources
  • Malformed packets targeting RRAS services

SIEM Query:

source="windows_security" event_id=4688 OR event_id=4625 | where process_name contains "RRAS" OR service_name="RemoteAccess"

🔗 References

📤 Share & Export