Attacker Value
Very High
(1 user assessed)
Exploitability
High
(1 user assessed)
User Interaction
Unknown
Privileges Required
Unknown
Attack Vector
Unknown
2

CVE-2024-49112

Disclosure Date: December 12, 2024
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
Privilege Escalation
Techniques
Validation
Validated

Description

Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability

Add Assessment

1
Ratings
Technical Analysis

CVE-2024-49112 is a critical vulnerability in the Windows Lightweight Directory Access Protocol (LDAP) service. It is classified as a remote code execution (RCE) flaw with a CVSS score of 9.8, making it a significant threat. Exploitation could allow attackers to execute arbitrary code on vulnerable systems, potentially leading to full system compromise.

This vulnerability is caused by an integer overflow within the LDAP service. Attackers can exploit the flaw by sending specially crafted Remote Procedure Call (RPC) requests to the target server. Successful exploitation enables arbitrary code execution in the context of the LDAP service, which often runs with elevated privileges. The flaw can be exploited remotely without authentication, making it particularly dangerous for internet-facing systems.

Looking at the image that was posted on X by @Madmodsec (https://x.com/MacmodSec/status/1867450280956018819/photo/1) it looks like the vulnerability in the unpatched wldap32.dll stems from insufficient validation of the referral index (v26), potentially leading to out-of-bounds reads or writes during referral handling. The patched version mitigates this by introducing a boundary check (EvaluateCurrentState), ensuring that the referral index (v164) falls within a valid range before further processing. Additionally, the patched code improves error logging by providing specific details when a referral index exceeds the allowable range. These changes enhance the safety of the code by preventing unsafe memory access and improving diagnostics for better traceability.

CVSS V3 Severity and Metrics
Base Score:
None
Impact Score:
Unknown
Exploitability Score:
Unknown
Vector:
Unknown
Attack Vector (AV):
Unknown
Attack Complexity (AC):
Unknown
Privileges Required (PR):
Unknown
User Interaction (UI):
Unknown
Scope (S):
Unknown
Confidentiality (C):
Unknown
Integrity (I):
Unknown
Availability (A):
Unknown

General Information

Vendors

  • microsoft

Products

  • windows 10 1507,
  • windows 10 1607,
  • windows 10 1809,
  • windows 10 21h2,
  • windows 10 22h2,
  • windows 11 22h2,
  • windows 11 24h2,
  • windows server 2008 -,
  • windows server 2008 r2,
  • windows server 2012 -,
  • windows server 2012 r2,
  • windows server 2016,
  • windows server 2019,
  • windows server 2022,
  • windows server 2022 23h2,
  • windows server 2025

References

Exploit
PoCs that have not been added by contributors directly have been sourced from: nomi-sec/PoC-in-GitHub.
A PoC added here by the AKB Worker must have at least 2 GitHub stars.

Additional Info

Technical Analysis