CVE-2024-38261

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) by sending specially crafted packets. It affects Windows servers and workstations with RRAS enabled, potentially allowing attackers to gain SYSTEM privileges on vulnerable systems.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service (RRAS)
Versions: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only systems with RRAS enabled are vulnerable. RRAS is not enabled by default on Windows systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains SYSTEM privileges on vulnerable Windows systems, enabling complete system compromise, lateral movement, and persistent access to the network.

🟠

Likely Case

Attackers exploit vulnerable RRAS servers to execute malicious code, potentially deploying ransomware, stealing credentials, or establishing backdoors for persistent access.

🟢

If Mitigated

With proper network segmentation and access controls, exploitation is limited to authorized network segments, reducing lateral movement potential.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted packets to RRAS service. No authentication is required to trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38261

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Disable the Routing and Remote Access Service if not required

sc config RemoteAccess start= disabled
net stop RemoteAccess

Block RRAS Ports

windows

Block network access to RRAS ports (TCP 1723, UDP 1701, UDP 500, UDP 4500)

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=TCP localport=1723
netsh advfirewall firewall add rule name="Block RRAS UDP" dir=in action=block protocol=UDP localport=1701,500,4500

🧯 If You Can't Patch

  • Disable RRAS service on all systems where it's not required
  • Implement strict network segmentation to isolate RRAS servers from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: Get-Service RemoteAccess | Select Status, StartType

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2024 security updates are installed: Get-HotFix | Where-Object {$_.InstalledOn -like "*7/2024*"}

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with RRAS process creation
  • Unexpected RRAS service restarts
  • Windows Security logs showing SYSTEM privilege escalation

Network Indicators:

  • Unusual traffic to RRAS ports (1723, 1701, 500, 4500) from unexpected sources
  • Malformed packets to RRAS service

SIEM Query:

source="windows" AND (event_id=4688 AND process_name="svchost.exe" AND command_line LIKE "%RemoteAccess%") OR (event_id=4624 AND logon_type=3 AND account_name="SYSTEM")

🔗 References

📤 Share & Export