CVE-2024-30013

8.8 HIGH

📋 TL;DR

CVE-2024-30013 is a double-free vulnerability (CWE-415) in Windows MultiPoint Services that allows remote attackers to execute arbitrary code on affected systems. This affects Windows Server systems running MultiPoint Services, potentially enabling complete system compromise. Attackers can exploit this without authentication over the network.

💻 Affected Systems

Products:
  • Windows MultiPoint Services
Versions: Windows Server 2016, 2019, 2022 with MultiPoint Services role installed
Operating Systems: Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when MultiPoint Services role is installed and enabled. Default Windows Server installations without this role are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with administrative privileges, enabling data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to malware installation, credential harvesting, and initial access for further network exploitation.

🟢

If Mitigated

Limited impact with proper network segmentation, but still potential for service disruption if exploited.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Microsoft rates this as 'Exploitation More Likely' based on CVSS and vulnerability characteristics. No public exploits confirmed as of analysis date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2024 security updates (KB5037765 for Server 2022, KB5037763 for Server 2019, KB5037761 for Server 2016)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30013

Restart Required: Yes

Instructions:

1. Apply May 2024 Windows Server security updates via Windows Update. 2. Restart affected servers. 3. Verify patch installation via 'systeminfo' command.

🔧 Temporary Workarounds

Disable MultiPoint Services

windows

Remove or disable the MultiPoint Services role if not required for business operations

Remove-WindowsFeature -Name MultiPoint-Services

Network Segmentation

all

Restrict network access to MultiPoint Services ports (default TCP 3351, 3389)

🧯 If You Can't Patch

  • Implement strict network access controls to limit connections to MultiPoint Services only from trusted sources
  • Deploy application control solutions to prevent unauthorized code execution and monitor for suspicious MultiPoint Services activity

🔍 How to Verify

Check if Vulnerable:

Check if MultiPoint Services role is installed: 'Get-WindowsFeature -Name MultiPoint-Services' and verify Windows Server version is 2016/2019/2022

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2024 security updates are installed: 'Get-HotFix -Id KB5037765, KB5037763, KB5037761' or check 'systeminfo' for update installation date

📡 Detection & Monitoring

Log Indicators:

  • Unusual MultiPoint Services process creation
  • Failed authentication attempts to MultiPoint Services
  • Unexpected service restarts or crashes

Network Indicators:

  • Unusual traffic to TCP port 3351 (MultiPoint Services)
  • Suspicious RPC calls to MultiPoint Services endpoints
  • Anomalous network connections from MultiPoint Services server

SIEM Query:

source="Windows Security" EventID=4688 AND (NewProcessName="*multipoint*" OR ParentProcessName="*multipoint*")

🔗 References

📤 Share & Export