CVE-2024-43456

4.8 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers to tamper with Windows Remote Desktop Services, potentially disrupting legitimate connections or altering service behavior. It affects Windows systems with Remote Desktop Services enabled, primarily impacting enterprise environments using RDS for remote access.

💻 Affected Systems

Products:
  • Windows Remote Desktop Services
Versions: Specific Windows versions as listed in Microsoft advisory
Operating Systems: Windows Server, Windows Client versions with RDS enabled
Default Config Vulnerable: ✅ No
Notes: Only affects systems with Remote Desktop Services enabled and configured. Default Windows installations without RDS enabled are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could disrupt Remote Desktop Services for legitimate users, causing denial of service for remote access capabilities or potentially manipulating service behavior to enable further attacks.

🟠

Likely Case

An authenticated user with access to the system could tamper with RDS settings or connections, potentially disrupting specific remote sessions or causing service instability.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to authorized users who would already have system access, reducing the attack surface significantly.

🌐 Internet-Facing: MEDIUM - Systems with RDS exposed to the internet are at higher risk, but exploitation requires authentication, reducing immediate threat compared to unauthenticated vulnerabilities.
🏢 Internal Only: MEDIUM - Internal attackers with valid credentials could exploit this to disrupt RDS operations, but impact is limited to service tampering rather than full system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to the target system. The CWE-284 classification indicates improper access control issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft's monthly security updates for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43456

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates from Microsoft. 2. Restart affected systems. 3. Verify RDS functionality post-patch.

🔧 Temporary Workarounds

Disable Remote Desktop Services if not needed

windows

Completely removes the attack surface by disabling the vulnerable component

Disable via Windows Services: sc config TermService start= disabled
Disable via Group Policy: Computer Configuration > Administrative Templates > Windows Components > Remote Desktop Services > Remote Desktop Session Host > Connections > Allow users to connect remotely using Remote Desktop Services = Disabled

Restrict RDS access via firewall

windows

Limit which systems can connect to RDS to reduce attack surface

New-NetFirewallRule -DisplayName "Restrict RDP" -Direction Inbound -Protocol TCP -LocalPort 3389 -Action Allow -RemoteAddress "Trusted_IP_Range"
netsh advfirewall firewall add rule name="Restrict RDP" dir=in action=allow protocol=TCP localport=3389 remoteip="Trusted_IP_Range"

🧯 If You Can't Patch

  • Implement strict access controls and least privilege for RDS users
  • Segment RDS servers from critical systems and monitor for unusual RDS activity

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for missing security patches related to CVE-2024-43456 or verify RDS service version

Check Version:

wmic qfe list | findstr /i "KB" or Get-HotFix | Where-Object {$_.HotFixID -like "KB*"}

Verify Fix Applied:

Verify Windows Update shows the latest security patches installed and check that RDS functions normally

📡 Detection & Monitoring

Log Indicators:

  • Unusual RDS service restarts in Windows Event Logs (Event ID 1074, 6006)
  • Failed RDS authentication attempts from unusual sources
  • Changes to RDS configuration settings

Network Indicators:

  • Unusual RDP connection patterns
  • Multiple failed RDP authentication attempts from single source

SIEM Query:

EventID=4625 AND TargetUserName="*" AND WorkstationName="*" | where RDP protocol indicators present

🔗 References

📤 Share & Export