CVE-2024-38104

8.8 HIGH

📋 TL;DR

CVE-2024-38104 is a remote code execution vulnerability in the Windows Fax Service that allows an attacker to execute arbitrary code with SYSTEM privileges on affected systems. This affects Windows servers and workstations running vulnerable versions of the Fax Service. An attacker could exploit this to take complete control of the target system.

💻 Affected Systems

Products:
  • Windows Fax Service
Versions: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with Fax Service enabled are vulnerable. Many enterprise environments may have this service disabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling data theft, ransomware deployment, lateral movement, and persistent backdoor installation across the network.

🟠

Likely Case

Initial foothold leading to privilege escalation, credential harvesting, and lateral movement within the network environment.

🟢

If Mitigated

Limited impact due to network segmentation, restricted service permissions, and comprehensive monitoring detecting exploitation attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' based on their assessment framework.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38104

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy through WSUS or Microsoft Update Catalog. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable Windows Fax Service

windows

Completely disable the vulnerable Fax Service to prevent exploitation

sc stop Fax
sc config Fax start= disabled

Block Fax Service Ports

windows

Block network access to Fax Service ports (typically TCP 2000-2001)

netsh advfirewall firewall add rule name="Block Fax Service" dir=in action=block protocol=TCP localport=2000-2001

🧯 If You Can't Patch

  • Disable Windows Fax Service on all affected systems immediately
  • Implement network segmentation to isolate systems with Fax Service enabled
  • Apply strict firewall rules blocking inbound Fax Service traffic
  • Enable enhanced logging and monitoring for Fax Service activity

🔍 How to Verify

Check if Vulnerable:

Check if Fax Service is running and system has not applied July 2024 security updates

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2024 security updates are installed and Fax Service is either patched or disabled

📡 Detection & Monitoring

Log Indicators:

  • Unexpected Fax Service start/stop events
  • Process creation from Fax Service executable
  • Network connections to Fax Service ports

Network Indicators:

  • Unusual traffic to TCP ports 2000-2001
  • Malformed Fax Service protocol packets
  • Connection attempts from unexpected sources

SIEM Query:

EventID=7045 OR EventID=7036 AND ServiceName="Fax" OR ProcessName="fxssvc.exe"

🔗 References

📤 Share & Export