CVE-2024-30071

4.7 MEDIUM

📋 TL;DR

This vulnerability in Windows Remote Access Connection Manager allows an authenticated attacker to read sensitive information from system memory. It affects Windows systems with Remote Access Connection Manager service enabled, potentially exposing credentials or other sensitive data.

💻 Affected Systems

Products:
  • Windows Remote Access Connection Manager
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Remote Access Connection Manager service to be enabled and running. Many enterprise configurations may have this disabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could extract sensitive information like credentials, encryption keys, or other privileged data from system memory, leading to lateral movement or privilege escalation.

🟠

Likely Case

Information disclosure of system or user data that could be used in further attacks, but requires local authenticated access.

🟢

If Mitigated

Minimal impact with proper access controls and network segmentation limiting authenticated user access to vulnerable systems.

🌐 Internet-Facing: LOW - Requires authenticated access and the Remote Access Connection Manager service is typically not internet-facing.
🏢 Internal Only: MEDIUM - Internal authenticated users could exploit this to gather information for lateral movement attacks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the target system. No public exploit code available as of current knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2024 security updates (KB5037771 for Windows 11, KB5037768 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30071

Restart Required: Yes

Instructions:

1. Apply May 2024 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS, SCCM, or Microsoft Update Catalog. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable Remote Access Connection Manager Service

windows

Disables the vulnerable service if not required for business operations

sc config RasMan start= disabled
sc stop RasMan

🧯 If You Can't Patch

  • Restrict access to systems with Remote Access Connection Manager service to only authorized users
  • Implement network segmentation to limit lateral movement potential from compromised accounts

🔍 How to Verify

Check if Vulnerable:

Check if Remote Access Connection Manager service is running: sc query RasMan

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2024 security updates are installed: wmic qfe list | findstr "KB5037771 KB5037768"

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with RasMan process creation
  • Unusual access patterns to Remote Access Connection Manager

Network Indicators:

  • Unusual connections to systems with RasMan service from non-standard accounts

SIEM Query:

source="windows" AND (event_id=4688 AND process_name="svchost.exe" AND command_line="*RasMan*")

🔗 References

📤 Share & Export