CVE-2024-30014

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running the Routing and Remote Access Service (RRAS) without authentication. Attackers can exploit this flaw by sending specially crafted packets to vulnerable RRAS servers. Organizations using Windows servers with RRAS enabled are affected.

💻 Affected Systems

Products:
  • Windows Server
  • Windows
Versions: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Operating Systems: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Default Config Vulnerable: ✅ No
Notes: Only systems with RRAS enabled are vulnerable. Most Windows installations have RRAS disabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to domain takeover, data exfiltration, ransomware deployment, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to malware installation, backdoor persistence, and credential harvesting from the compromised server.

🟢

If Mitigated

Limited impact due to network segmentation, proper firewall rules, and RRAS service disabled on non-essential systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Microsoft has not disclosed technical details. Exploitation requires network access to RRAS service ports.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30014

Restart Required: Yes

Instructions:

1. Apply May 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Disable the Routing and Remote Access Service if not required for business operations.

sc config RemoteAccess start= disabled
sc stop RemoteAccess

Block RRAS Ports

all

Configure firewalls to block access to RRAS service ports (TCP 1723, UDP 1701, UDP 500, UDP 4500).

🧯 If You Can't Patch

  • Disable RRAS service on all non-essential systems
  • Implement strict network segmentation and firewall rules to isolate RRAS servers

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: 'sc query RemoteAccess' and verify Windows version is unpatched.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2024 security updates are installed via 'systeminfo' command and confirm RRAS service version.

📡 Detection & Monitoring

Log Indicators:

  • Unusual RRAS service crashes in Event Viewer
  • Failed authentication attempts to RRAS
  • Unexpected network connections to RRAS ports

Network Indicators:

  • Unusual traffic patterns to RRAS ports (1723, 1701, 500, 4500)
  • Malformed packets targeting RRAS service

SIEM Query:

source="windows" AND (event_id=4625 OR event_id=7034) AND service_name="RemoteAccess"

🔗 References

📤 Share & Export