CVE-2024-38072

7.5 HIGH

📋 TL;DR

CVE-2024-38072 is a denial-of-service vulnerability in the Windows Remote Desktop Licensing Service where specially crafted packets can cause the service to crash. This affects Windows servers running Remote Desktop Licensing Service, potentially disrupting legitimate Remote Desktop connections. Organizations using Windows Remote Desktop Services for licensing are impacted.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2019, Windows Server 2022, and later versions with Remote Desktop Licensing Service enabled
Operating Systems: Windows Server
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Remote Desktop Licensing Service is installed and running. Not all Windows Server installations have this service enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete unavailability of Remote Desktop Licensing Service, preventing new Remote Desktop connections and disrupting existing licensed sessions across the enterprise.

🟠

Likely Case

Temporary service disruption requiring service restart, causing connection delays and potential licensing issues for Remote Desktop clients.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring allowing quick detection and service restoration.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. The vulnerability requires network access to the licensing service port (typically TCP 135 or 445).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38072

Restart Required: Yes

Instructions:

1. Apply the July 2024 Windows Server security updates from Windows Update or Microsoft Update Catalog. 2. Restart the server to complete the installation. 3. Verify the Remote Desktop Licensing Service is running properly after restart.

🔧 Temporary Workarounds

Disable Remote Desktop Licensing Service

windows

Temporarily disable the vulnerable service if not required for operations

Stop-Service -Name TermServLicensing
Set-Service -Name TermServLicensing -StartupType Disabled

Network Segmentation

windows

Restrict access to Remote Desktop Licensing Service ports

New-NetFirewallRule -DisplayName "Block RD Licensing" -Direction Inbound -Protocol TCP -LocalPort 135,445 -Action Block

🧯 If You Can't Patch

  • Implement strict network access controls to limit which systems can reach the Remote Desktop Licensing Service ports
  • Monitor service health and implement automated restart procedures if the service crashes

🔍 How to Verify

Check if Vulnerable:

Check if Remote Desktop Licensing Service is installed and running: Get-Service TermServLicensing | Select Status, StartType

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains July 2024 security updates and check service version after patch

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1000 or 1001 in Application logs indicating TermServLicensing service crash
  • Unexpected service termination events in System logs

Network Indicators:

  • Multiple connection attempts to TCP port 135 or 445 followed by service unavailability
  • Unusual packet patterns to Remote Desktop Licensing ports

SIEM Query:

source="windows" AND (event_id=1000 OR event_id=1001) AND process_name="TermServLicensing.exe"

🔗 References

📤 Share & Export