CVE-2024-49118

8.1 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running Microsoft Message Queuing (MSMQ) by sending specially crafted packets. It affects Windows systems with MSMQ enabled, particularly those exposed to untrusted networks. Attackers could gain SYSTEM-level privileges on compromised systems.

💻 Affected Systems

Products:
  • Microsoft Message Queuing (MSMQ)
Versions: All supported Windows versions with MSMQ component enabled
Operating Systems: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Default Config Vulnerable: ✅ No
Notes: MSMQ is not enabled by default on Windows systems. Only systems where MSMQ has been explicitly installed/enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling attackers to install malware, exfiltrate data, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data theft, or lateral movement within enterprise networks.

🟢

If Mitigated

Limited impact if MSMQ is disabled or properly firewalled, with attackers unable to reach vulnerable services.

🌐 Internet-Facing: HIGH - MSMQ services exposed to the internet are directly vulnerable to remote exploitation without authentication.
🏢 Internal Only: MEDIUM - Internal systems with MSMQ enabled remain vulnerable to attackers who gain initial network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. The vulnerability requires no authentication and has low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in July 2024 Patch Tuesday

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49118

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates via Windows Update. 2. For enterprise environments, deploy patches through WSUS or SCCM. 3. Restart affected systems to complete installation.

🔧 Temporary Workarounds

Disable MSMQ Service

windows

Completely disable the MSMQ service if not required for business operations

sc config MSMQ start= disabled
sc stop MSMQ

Block MSMQ Ports

windows

Block network access to MSMQ ports (TCP 1801, TCP 2103, TCP 2105, UDP 3527, UDP 1801)

netsh advfirewall firewall add rule name="Block MSMQ" dir=in action=block protocol=TCP localport=1801,2103,2105
netsh advfirewall firewall add rule name="Block MSMQ UDP" dir=in action=block protocol=UDP localport=3527,1801

🧯 If You Can't Patch

  • Disable MSMQ service immediately on all systems where it's not essential
  • Implement strict network segmentation and firewall rules to block MSMQ traffic (TCP 1801, 2103, 2105; UDP 3527, 1801) from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if MSMQ service is running: Get-Service MSMQ (PowerShell) or sc query MSMQ (CMD). If service exists and is running, system is vulnerable if unpatched.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2024 security updates are installed: Get-HotFix -Id KB5035857 (or applicable KB number) in PowerShell, or check Windows Update history.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with MSMQ process creation
  • Unexpected MSMQ service restarts
  • Security log entries showing failed authentication to MSMQ

Network Indicators:

  • Unusual traffic to MSMQ ports (TCP 1801, 2103, 2105; UDP 3527, 1801) from external sources
  • Large volume of malformed packets to MSMQ ports

SIEM Query:

source="windows_security" EventID=4688 AND (ProcessName="*mqsvc.exe" OR ProcessName="*mqrt.dll")

🔗 References

📤 Share & Export