CVE-2024-38265

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) by sending specially crafted packets. It affects Windows servers and workstations with RRAS enabled, potentially allowing complete system compromise. The vulnerability stems from improper input validation (CWE-20) in the RRAS component.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service (RRAS)
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if RRAS role/service is enabled and configured. Default Windows installations typically do not have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with SYSTEM/administrator privileges, enabling lateral movement, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to malware installation, credential theft, and network reconnaissance from compromised systems.

🟢

If Mitigated

Limited impact if network segmentation, firewalls, and least-privilege access controls prevent exploitation or contain damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to RRAS service ports. No authentication needed for initial attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest Windows security updates from Microsoft (specific KB numbers vary by OS version)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38265

Restart Required: Yes

Instructions:

1. Apply Windows Update from Microsoft. 2. Install the latest security updates for your Windows version. 3. Restart the system to complete installation.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Disable the Routing and Remote Access Service if not required for business operations

sc config RemoteAccess start= disabled
sc stop RemoteAccess

Block RRAS Ports

windows

Block network access to RRAS service ports (typically TCP 1723, UDP 1701, UDP 500, UDP 4500) using firewall rules

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=TCP localport=1723
netsh advfirewall firewall add rule name="Block RRAS UDP" dir=in action=block protocol=UDP localport=1701,500,4500

🧯 If You Can't Patch

  • Disable RRAS service immediately if not required
  • Implement strict network segmentation and firewall rules to isolate RRAS systems from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: sc query RemoteAccess | findstr RUNNING

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains the latest security updates and RRAS service is either disabled or patched

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4688 (process creation) from RRAS service
  • Unexpected network connections to RRAS ports
  • Crash logs from RemoteAccess service

Network Indicators:

  • Unusual traffic patterns to RRAS ports (TCP 1723, UDP 1701/500/4500)
  • Malformed packets targeting RRAS service

SIEM Query:

EventID=4688 AND (NewProcessName="*\svchost.exe" AND ProcessCommandLine="*RemoteAccess*")

🔗 References

📤 Share & Export