PoC Released for 0-click RCE Flaw Impacting Windows Server – MadLicense

PoC exploit released for serious 0-click a ways off code execution (RCE) vulnerability affecting Windows Server. This flaw impacts Windows Server versions from 2000 to basically the most up-to-date 2025 preview.
This vulnerability, identified as CVE-2024-38077, resides within the Windows Remote Desktop Licensing Provider and poses a principal risk as a result of its ability to be exploited with none user interplay.
The vulnerability, dubbed “MadLicense,” is a pre-authentication RCE flaw that enables attackers to possess arbitrary code on prone programs with out requiring user interplay.
Unlike many RCE vulnerabilities that require some produce of user interplay, the CVE-2024-38077 vulnerability may perchance even be exploited with none user circulate.
That is namely concerning given the frequent remark of the Remote Desktop Licensing Provider, which is in overall deployed on servers with Remote Desktop Services and products enabled. The service manages and factors licenses for a ways off desktop derive admission to, making it a principal element in many commerce environments.
Exploit Launched – MadLicense
The flaw is rooted in a heap overflow vulnerability within the CDataCoding::DecodeData
feature. This selection improperly handles user-controlled input, main to a buffer overflow situation.
The PoC exploit from researchers Ver, Lewis Lee, and Zhiniang Peng demonstrates how this vulnerability may perchance even be leveraged to avoid in vogue security mitigations in Windows Server 2025, reaching elephantine a ways off code execution capabilities.
The exploit works by manipulating the licensing service to load a a ways off DLL, allowing attackers to possess arbitrary shellcode within the service’s activity. Even supposing the PoC equipped is a pseudocode and deliberately obfuscated to prevent abuse, it highlights the severity of the vulnerability and the possibility of exploitation.
With over 170,000 Remote Desktop Licensing Services and products uncovered to the general public internet, this vulnerability’s doable impact is gargantuan. The vulnerability’s 0-click nature makes it namely unsafe, because it will even be exploited with none user interplay, growing the risk of frequent attacks.
Microsoft has been the truth is helpful relating to the exploitability of this vulnerability nonetheless before the entirety marked it as “exploitation less doubtless.” No subject this, security researchers emphasize the urgency of patching affected programs to prevent doable exploitation.
“We demonstrate how a single vulnerability became exploited to avoid all mitigations and possess a pre-authentication a ways off code execution (RCE) assault on Windows Server 2025, Which is even handed basically the most exact Windows Server,” researchers added.
To mitigate the risk, organizations are truly helpful to look at Microsoft’s most up-to-date security updates. Furthermore, network administrators can own to retain in solutions imposing extra security measures, corresponding to network segmentation and strict derive admission to controls, to diminish the assault floor.
The researchers within the encourage of the invention own engaged in responsible disclosure practices, providing Microsoft with crucial capabilities relating to the vulnerability and its exploitability. They design to steal awareness relating to the hazards linked to the vulnerability and abet rapid circulate to exact affected programs.
While Microsoft before the entirety marked the exploitability of this vulnerability as “less doubtless,” the proof-of-thought (PoC) demonstrates that it may bypass in vogue security mitigations, even on basically the most up-to-date Windows Server 2025, which is designed to provide next-generation security improvements.
Currently, there are no identified exploits circulating for the CVE-2024-38077 vulnerability. Microsoft has released a patch and it will be principal for users to look at this update to mitigate doable risks.
Source credit : cybersecuritynews.com