CVE-2024-43479

8.5 HIGH

📋 TL;DR

This vulnerability allows remote code execution in Microsoft Power Automate Desktop, enabling attackers to execute arbitrary code on affected systems. It affects organizations using Power Automate Desktop for automation workflows. Attackers could potentially gain full control of systems running vulnerable versions.

💻 Affected Systems

Products:
  • Microsoft Power Automate Desktop
Versions: Versions prior to the July 2024 security update
Operating Systems: Windows 10, Windows 11
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Power Automate Desktop to be installed and configured for automation workflows.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attacker to install malware, steal data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Attacker gains initial foothold in network, executes malicious payloads, and escalates privileges to access sensitive data.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege access, and monitoring preventing lateral movement.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires specific conditions and may involve social engineering or initial access through other vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security update for Power Automate Desktop

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43479

Restart Required: Yes

Instructions:

1. Open Power Automate Desktop
2. Navigate to Settings > Updates
3. Install the July 2024 security update
4. Restart the application and affected systems

🔧 Temporary Workarounds

Disable Power Automate Desktop

windows

Temporarily disable Power Automate Desktop if not critically needed

Stop-Service -Name "Power Automate Desktop Service"
Set-Service -Name "Power Automate Desktop Service" -StartupType Disabled

Network Segmentation

all

Isolate systems running Power Automate Desktop from critical networks

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Power Automate Desktop systems
  • Apply principle of least privilege and monitor for suspicious Power Automate Desktop activity

🔍 How to Verify

Check if Vulnerable:

Check Power Automate Desktop version in Settings > About. If version is prior to July 2024 update, system is vulnerable.

Check Version:

Get-ItemProperty "HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\*" | Where-Object {$_.DisplayName -like "*Power Automate Desktop*"} | Select-Object DisplayName, DisplayVersion

Verify Fix Applied:

Verify Power Automate Desktop version shows July 2024 or later update installed in Settings > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Power Automate Desktop process execution patterns
  • Suspicious command execution via Power Automate Desktop
  • Failed authentication attempts to Power Automate Desktop services

Network Indicators:

  • Unexpected outbound connections from Power Automate Desktop systems
  • Anomalous network traffic to/from Power Automate Desktop ports

SIEM Query:

source="PowerAutomateDesktop" AND (event_type="process_execution" OR event_type="remote_execution")

🔗 References

📤 Share & Export