CVE-2024-38212

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) by sending specially crafted packets. It affects Windows servers and workstations with RRAS enabled, potentially allowing complete system compromise. The vulnerability stems from a heap-based buffer overflow (CWE-122) in the RRAS component.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service (RRAS)
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if RRAS role is installed and enabled. Default Windows installations do not have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, enabling attackers to install malware, steal data, pivot to other systems, or create persistent backdoors.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data exfiltration, or lateral movement within the network.

🟢

If Mitigated

Limited impact if network segmentation, firewalls, and proper access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. The vulnerability requires network access to RRAS ports but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the July 2024 Windows security updates (or later)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38212

Restart Required: Yes

Instructions:

1. Apply the latest Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS, Configuration Manager, or equivalent. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Temporarily disable the Routing and Remote Access Service if not required

sc config RemoteAccess start= disabled
net stop RemoteAccess

Block RRAS Ports

all

Block network access to RRAS ports (typically TCP 1723, UDP 1701, UDP 500, UDP 4500) using firewalls

🧯 If You Can't Patch

  • Disable RRAS service immediately if not required for business operations
  • Implement strict network segmentation and firewall rules to limit access to RRAS services

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running and system has not applied July 2024 or later Windows security updates

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history shows July 2024 security updates installed and RRAS service version is updated

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4688 (process creation) from RRAS service
  • Application crashes in RRAS-related processes
  • Unusual network connections to RRAS ports

Network Indicators:

  • Unusual traffic patterns to RRAS ports (TCP 1723, UDP 1701, UDP 500, UDP 4500)
  • Malformed packets targeting RRAS services

SIEM Query:

source="windows" AND (event_id=4688 AND process_name="svchost.exe" AND service_name="RemoteAccess") OR (event_id=1000 AND application_name LIKE "%rras%")

🔗 References

📤 Share & Export