
Cloud Vulnerability DB
A community-led vulnerabilities database
Windows Remote Desktop Services Remote Code Execution Vulnerability (CVE-2024-49116) is a critical security flaw discovered in December 2024. This vulnerability affects multiple versions of Windows Server, including Server 2016, 2019, 2022, 2022 23H2, and 2025. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) (NVD).
The vulnerability involves a race condition on a Remote Desktop Gateway system that can create a use-after-free scenario, potentially allowing arbitrary code execution. The CVSS vector string is CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating that the vulnerability can be exploited remotely with no privileges or user interaction required (Arctic Wolf).
If successfully exploited, this vulnerability could allow an attacker to execute arbitrary code in the context of the Remote Desktop Services system. The high severity rating indicates potential significant impact on the confidentiality, integrity, and availability of the affected systems (NVD).
Microsoft has released security updates to address this vulnerability. Affected users should upgrade to the latest fixed versions available through Windows Update. The specific update versions vary by Windows Server version, with Server 2016 requiring update 5048671, Server 2019 requiring update 5048661, and Server 2022 requiring updates 5048654 and 5048800 (Arctic Wolf).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."