CVE-2024-49104

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) without authentication. It affects Windows servers and workstations with RRAS enabled, potentially allowing complete system compromise. The vulnerability stems from a heap-based buffer overflow (CWE-122) in the RRAS component.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only systems with Routing and Remote Access Service (RRAS) enabled are vulnerable. RRAS is not enabled by default on most Windows installations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with SYSTEM privileges, enabling lateral movement, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to malware installation, credential theft, and network reconnaissance from compromised systems.

🟢

If Mitigated

Limited impact if RRAS is disabled or network access is restricted, though vulnerable systems remain at risk if exposed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted packets to the RRAS service. The CVSS score of 8.8 indicates high severity with network-accessible attack vector.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest Windows security updates from Microsoft's October 2024 Patch Tuesday or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49104

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Click 'Check for updates'. 3. Install all available security updates. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Disables the Routing and Remote Access Service if not required

sc config RemoteAccess start= disabled
net stop RemoteAccess

Block RRAS Ports

windows

Blocks network access to RRAS ports using Windows Firewall

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=any localport=1701,1723,47 program="%SystemRoot%\system32\svchost.exe" service="RemoteAccess"
netsh advfirewall firewall add rule name="Block RRAS Outbound" dir=out action=block protocol=any localport=1701,1723,47 program="%SystemRoot%\system32\svchost.exe" service="RemoteAccess"

🧯 If You Can't Patch

  • Disable RRAS service immediately if not required for business operations
  • Implement strict network segmentation and firewall rules to block access to RRAS ports (1701, 1723, 47) from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: sc query RemoteAccess | findstr "RUNNING"

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history contains the October 2024 security updates and RRAS service is either disabled or patched

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4625 (failed logon) from RRAS service
  • Event ID 4688 (process creation) with unusual parent processes
  • Windows Security logs showing unexpected RRAS service activity

Network Indicators:

  • Unusual traffic to RRAS ports (1701, 1723, 47) from external sources
  • Malformed packets targeting RRAS service

SIEM Query:

source="windows" (event_id=4625 OR event_id=4688) AND process_name="svchost.exe" AND service="RemoteAccess"

🔗 References

📤 Share & Export