CVE-2024-38199

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows remote attackers to execute arbitrary code on Windows systems running the Line Printer Daemon (LPD) service. Attackers can exploit this without authentication by sending specially crafted requests to the vulnerable service. All Windows systems with LPD enabled are affected.

💻 Affected Systems

Products:
  • Windows Line Printer Daemon (LPD) Service
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when LPD service is enabled. LPD is not enabled by default on most Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling data theft, ransomware deployment, or complete system takeover.

🟠

Likely Case

Remote code execution leading to malware installation, lateral movement within networks, and data exfiltration.

🟢

If Mitigated

Limited impact if LPD service is disabled or network access is restricted, though vulnerable systems remain at risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has rated this as 'Exploitation More Likely' in their advisory. The vulnerability requires network access to the LPD service port (typically TCP 515).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38199

Restart Required: Yes

Instructions:

1. Apply the July 2024 Windows security updates from Windows Update. 2. For enterprise environments, deploy updates via WSUS, SCCM, or Intune. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable LPD Service

windows

Disable the Line Printer Daemon service if not required for operations

sc config lpdsvc start= disabled
sc stop lpdsvc

Block LPD Port

windows

Block TCP port 515 at network perimeter and internal firewalls

netsh advfirewall firewall add rule name="Block LPD" dir=in action=block protocol=TCP localport=515

🧯 If You Can't Patch

  • Disable LPD service immediately on all affected systems
  • Implement strict network segmentation and firewall rules to block access to TCP port 515

🔍 How to Verify

Check if Vulnerable:

Check if LPD service is running: sc query lpdsvc | findstr RUNNING

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2024 security updates are installed: wmic qfe list | findstr "KB5039211"

📡 Detection & Monitoring

Log Indicators:

  • Unusual connections to TCP port 515
  • LPD service process spawning unexpected child processes
  • Security event logs showing service manipulation

Network Indicators:

  • Unusual traffic patterns to/from TCP port 515
  • Malformed LPD protocol packets
  • Connection attempts from unexpected sources to LPD service

SIEM Query:

source="windows" AND (event_id=4688 OR event_id=5156) AND (process_name="lpdsvc.exe" OR dest_port=515)

🔗 References

📤 Share & Export