CVE-2024-43467

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running the Remote Desktop Licensing Service. Attackers can exploit this without authentication to gain SYSTEM privileges on affected servers. Organizations using Windows Remote Desktop Services with licensing enabled are primarily affected.

💻 Affected Systems

Products:
  • Windows Remote Desktop Licensing Service
Versions: Windows Server 2019, Windows Server 2022, Windows 11, Windows 10
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with Remote Desktop Services role installed and licensing enabled are vulnerable. The service runs with SYSTEM privileges by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges leading to data theft, ransomware deployment, lateral movement across the network, and persistent backdoor installation.

🟠

Likely Case

Initial foothold for attackers to establish persistence, deploy malware, and move laterally within the network to compromise additional systems.

🟢

If Mitigated

Limited impact due to network segmentation and proper access controls, potentially resulting in isolated service disruption but preventing lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has rated this as 'Exploitation More Likely' in their advisory. The vulnerability requires no authentication and has low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2024 security updates (KB5037765 for Windows Server 2022, KB5037768 for Windows Server 2019, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43467

Restart Required: Yes

Instructions:

1. Apply the May 2024 Windows security updates from Microsoft Update Catalog. 2. Restart affected systems. 3. Verify the patch is installed via Windows Update history or system information.

🔧 Temporary Workarounds

Disable Remote Desktop Licensing Service

windows

Stop and disable the vulnerable service if not required for operations

sc stop TermServLicensing
sc config TermServLicensing start= disabled

Block RPC port 135

windows

Block incoming connections to the RPC endpoint mapper port used by the service

netsh advfirewall firewall add rule name="Block RPC 135" dir=in action=block protocol=TCP localport=135

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Remote Desktop Licensing servers from critical assets
  • Apply principle of least privilege and monitor for suspicious service activity

🔍 How to Verify

Check if Vulnerable:

Check if Remote Desktop Licensing Service is running and if May 2024 security updates are not installed

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5037765 (Server 2022), KB5037768 (Server 2019), or equivalent May 2024 updates are installed

📡 Detection & Monitoring

Log Indicators:

  • Unexpected TermServLicensing service crashes
  • Suspicious process creation from svchost.exe
  • Unusual network connections from licensing service

Network Indicators:

  • Anomalous RPC traffic to port 135 from external sources
  • Unexpected outbound connections from licensing server

SIEM Query:

source="windows" AND (event_id=7034 OR event_id=4688) AND process_name="TermServLicensing"

🔗 References

📤 Share & Export