CVE-2024-38049

6.6 MEDIUM

📋 TL;DR

CVE-2024-38049 is a remote code execution vulnerability in Windows Distributed Transaction Coordinator (MSDTC) that allows an authenticated attacker to execute arbitrary code with SYSTEM privileges on affected systems. This affects Windows servers and workstations running vulnerable versions. The vulnerability requires network access to the MSDTC service.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with MSDTC service enabled and network accessible are vulnerable. MSDTC is often enabled by default on Windows Server installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling lateral movement, data exfiltration, ransomware deployment, and persistent backdoor installation across the network.

🟠

Likely Case

Privilege escalation leading to domain compromise, credential theft, and installation of malware or persistence mechanisms on affected systems.

🟢

If Mitigated

Limited impact due to network segmentation, restricted MSDTC service access, and proper authentication controls preventing unauthorized access.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authentication and network access to the MSDTC service. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38049

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS, SCCM, or equivalent patch management system. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable MSDTC network access

windows

Restrict MSDTC service to local access only to prevent remote exploitation

sc config msdtc start= disabled
netsh advfirewall firewall add rule name="Block MSDTC" dir=in action=block protocol=TCP localport=135,1024-65535

Enable Windows Firewall rules

windows

Block MSDTC ports at the network perimeter

New-NetFirewallRule -DisplayName "Block MSDTC" -Direction Inbound -Protocol TCP -LocalPort 135,1024-65535 -Action Block

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems with MSDTC enabled
  • Apply strict firewall rules to block MSDTC ports (TCP 135 and dynamic RPC ports) from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if July 2024 security updates are installed via 'systeminfo' command or Windows Update history

Check Version:

wmic qfe list | findstr KB5035857

Verify Fix Applied:

Verify KB5035857 (Windows 10/11) or KB5035855 (Server 2016/2019/2022) is installed

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4625 (failed logon) followed by MSDTC service activity
  • Unusual process creation from MSDTC service context
  • Windows Security logs showing authentication to MSDTC service

Network Indicators:

  • Unexpected connections to TCP port 135 (RPC) followed by dynamic RPC port connections
  • Network traffic to MSDTC service from unauthorized sources

SIEM Query:

source="windows_security" event_id=4625 AND process_name="msdtc.exe" | stats count by src_ip, dest_ip

🔗 References

📤 Share & Export