CVE-2024-49122

8.1 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running Microsoft Message Queuing (MSMQ) by sending specially crafted packets. It affects Windows systems with MSMQ enabled, potentially allowing attackers to gain SYSTEM privileges. Organizations using MSMQ for message queuing services are at risk.

💻 Affected Systems

Products:
  • Microsoft Message Queuing (MSMQ)
Versions: Windows Server 2019, Windows Server 2022, Windows 11, Windows 10
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if MSMQ service is installed and enabled. Not installed by default on most Windows versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker gains SYSTEM privileges on vulnerable server, leading to complete system compromise, lateral movement, and data exfiltration.

🟠

Likely Case

Attacker executes code with SYSTEM privileges on vulnerable MSMQ server, potentially installing malware, ransomware, or backdoors.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to isolated MSMQ service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2024 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49122

Restart Required: Yes

Instructions:

1. Apply July 2024 Windows security updates. 2. Restart affected systems. 3. Verify MSMQ service is running expected version.

🔧 Temporary Workarounds

Disable MSMQ Service

windows

Stop and disable Microsoft Message Queuing service if not required

sc stop MSMQ
sc config MSMQ start= disabled

Block MSMQ Ports

windows

Block network access to MSMQ ports (TCP 1801, TCP 2103, TCP 2105, UDP 3527, UDP 1801)

netsh advfirewall firewall add rule name="Block MSMQ" dir=in action=block protocol=TCP localport=1801,2103,2105
netsh advfirewall firewall add rule name="Block MSMQ UDP" dir=in action=block protocol=UDP localport=3527,1801

🧯 If You Can't Patch

  • Disable MSMQ service entirely if not required for business operations
  • Implement strict network segmentation to isolate MSMQ servers from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if MSMQ service is installed and running: Get-Service MSMQ (PowerShell) or sc query MSMQ (CMD)

Check Version:

Get-WmiObject Win32_Service | Where-Object {$_.Name -eq 'MSMQ'} | Select-Object Name, State, StartMode

Verify Fix Applied:

Verify July 2024 security updates are installed via Windows Update history or Get-HotFix -Id KB5035855 (example KB, check actual)

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with MSMQ process creation
  • Unexpected MSMQ service restarts
  • MSMQ error logs with memory access violations

Network Indicators:

  • Unusual traffic to MSMQ ports (1801, 2103, 2105, 3527) from unexpected sources
  • Large or malformed MSMQ packets

SIEM Query:

source="windows" AND (event_id=4688 AND process_name="*msmq*") OR (destination_port IN (1801, 2103, 2105, 3527) AND protocol="TCP/UDP")

🔗 References

📤 Share & Export