CVE-2024-38214

6.5 MEDIUM

📋 TL;DR

This vulnerability in Windows Routing and Remote Access Service (RRAS) allows attackers to read sensitive information from memory that should be protected. It affects Windows systems with RRAS enabled, potentially exposing credentials or other confidential data. The vulnerability requires an attacker to have local access to the target system.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service (RRAS)
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only systems with RRAS enabled are vulnerable. RRAS is not enabled by default on most Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could extract sensitive information like credentials, encryption keys, or other protected data from memory, leading to privilege escalation or lateral movement within the network.

🟠

Likely Case

Local attackers could read portions of memory containing sensitive information, potentially compromising user credentials or system secrets.

🟢

If Mitigated

With proper access controls and network segmentation, the impact is limited to information disclosure within already-compromised systems.

🌐 Internet-Facing: LOW - This vulnerability requires local access to exploit, so internet-facing systems are not directly vulnerable unless an attacker already has some foothold.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this to gather sensitive information for privilege escalation or lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the target system and knowledge of memory structures. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates (KB5040437 for Windows 11, KB5040435 for Windows 10, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38214

Restart Required: Yes

Instructions:

1. Apply the July 2024 Windows security updates from Windows Update. 2. Alternatively, download and install the specific KB patch for your Windows version. 3. Restart the system to complete the installation.

🔧 Temporary Workarounds

Disable RRAS if not needed

windows

Disable the Routing and Remote Access Service if it's not required for your environment

sc config RemoteAccess start= disabled
sc stop RemoteAccess

Restrict local access

all

Implement strict access controls to limit who has local access to systems with RRAS enabled

🧯 If You Can't Patch

  • Disable RRAS service if not required for business operations
  • Implement network segmentation to isolate systems with RRAS enabled from critical assets

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running and if July 2024 security updates are not installed. Use: sc query RemoteAccess

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2024 security updates are installed via: wmic qfe list | findstr KB5040437 (or appropriate KB for your version)

📡 Detection & Monitoring

Log Indicators:

  • Unusual local process access to RRAS components
  • Multiple failed attempts to access protected memory regions

Network Indicators:

  • Unusual local network traffic patterns from systems with RRAS enabled

SIEM Query:

EventID=4688 AND ProcessName LIKE '%rras%' AND CommandLine CONTAINS 'memory'

🔗 References

📤 Share & Export