CVE-2024-43611

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) by sending specially crafted packets. It affects Windows servers and workstations with RRAS enabled, potentially allowing complete system compromise.

💻 Affected Systems

Products:
  • Windows Routing and Remote Access Service (RRAS)
Versions: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11 (specific versions as per Microsoft advisory)
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when RRAS role/service is enabled and running. Default Windows installations do not have RRAS enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to system takeover, credential harvesting, and network reconnaissance from compromised RRAS servers.

🟢

If Mitigated

Limited impact if RRAS is disabled or properly firewalled, with potential for denial of service but not code execution.

🌐 Internet-Facing: HIGH - RRAS servers exposed to the internet are directly vulnerable to remote exploitation without authentication.
🏢 Internal Only: MEDIUM - Internal RRAS servers are vulnerable to authenticated attackers or those who gain initial network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' and the vulnerability requires no authentication, making it attractive to attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest Windows security updates from October 2024 or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43611

Restart Required: Yes

Instructions:

1. Apply Windows security updates via Windows Update or WSUS. 2. For Server Core, use: wusa.exe <update>.msu /quiet /norestart. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Stop and disable the Routing and Remote Access Service if not required

sc stop RemoteAccess
sc config RemoteAccess start= disabled

Block RRAS Ports

windows

Firewall blocking of RRAS network ports (TCP 1723, UDP 1701, UDP 500, UDP 4500)

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=TCP localport=1723
netsh advfirewall firewall add rule name="Block RRAS UDP" dir=in action=block protocol=UDP localport=1701,500,4500

🧯 If You Can't Patch

  • Disable RRAS service immediately on all affected systems
  • Implement strict network segmentation and firewall rules to isolate RRAS servers from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: sc query RemoteAccess | findstr RUNNING. If running and system is unpatched, it's vulnerable.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains October 2024 security updates and RRAS service can be restarted without issues.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with RRAS process creation, unexpected RRAS service restarts, Windows Security logs with exploit patterns

Network Indicators:

  • Unusual traffic to RRAS ports (1723, 1701, 500, 4500) from unexpected sources, malformed VPN/RAS packets

SIEM Query:

source="windows" (event_id=4688 AND process_name="*svchost*" AND command_line="*RemoteAccess*") OR (event_id=7036 AND service_name="RemoteAccess" AND NOT (status="stopped" OR status="started normally"))

🔗 References

📤 Share & Export