CVE-2024-43453
vulnerability analysis and mitigation

Overview

Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability (CVE-2024-43453) was disclosed on October 8, 2024. This vulnerability affects various versions of Microsoft Windows Server, including Server 2008, 2012, 2016, 2019, and 2022. The vulnerability received a CVSSv3 score of 8.8 and is rated as important (NVD).

Technical details

CVE-2024-43453 is a Remote Code Execution (RCE) vulnerability in Windows Routing and Remote Access Service (RRAS). The vulnerability has been assigned a CVSSv3 score of 8.8 HIGH with the following vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H. Microsoft has classified this vulnerability as 'Exploitation Less Likely' based on their Exploitability Index (Tenable Blog).

Impact

An attacker could exploit this vulnerability without authentication by either targeting a vulnerable server with a specially crafted protocol message or tricking a user to submit a request to a malicious server. Successful exploitation could lead to remote code execution on the vulnerable machine (Tenable Blog).

Mitigation and workarounds

Microsoft has released patches for affected versions of Windows Server, including Server 2008 SP2, Server 2008 R2 SP1, Server 2012, Server 2012 R2, Server 2016, Server 2019, Server 2022, and Server 2022 23H2. Organizations are advised to apply the available patches as soon as possible (NVD).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management