CVE-2024-49112

Published Dec 12, 2024

Last updated 3 days ago

Insights

Analysis from the Intruder Security Team
Published Jan 2, 2025

SafeBreach published a writeup on January 1st which exploits a denial of service condition and attributes it to this CVE, but the original researcher that reported this bug to Microsoft disagrees

Though the full PoC being published does mean that attacks are more likely, the exploit for CVE-2024-49112 is not yet in the public domain, and so only highly resourced attack groups are likely to be able to exploit the RCE

Overview

Description
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Source
secure@microsoft.com
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Secondary
Base score
9.8
Impact score
5.9
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

secure@microsoft.com
CWE-190
nvd@nist.gov
NVD-CWE-noinfo

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

1

  1. 🔒 Windows Zero-Click Vulnerability (CVE-2024-49112) PoC exploit released—patch now to stay protected! Details: https://t.co/ZJFC8guGcw #Cybersecurity #CVE2024 #InfoSec

    @Sajin92487373

    16 Jan 2025

    19 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. به تازگی آسیب پذیری جدیدی برای سرویس LDAP با کدهای شناسایی CVE-2024-49112 و CVE-2024-49113 منتشر شد. اکسپلویت این آسیب پذیری با نام LDAPNightmare در GitHub به عنوان poc و برای شناسایی این آسیب پذیری توسط کاربران این سرویس ، بارگزاری شد. https://t.co/Poz3aKYxT1 https://t.co/i2Oo

    @AmirHossein_sec

    14 Jan 2025

    35 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. CVE-2024-49112 has a CVSS rating of 9.8 ☠️ this is sugar for ransomware https://t.co/ialKfb7Yvi

    @cyber_scrutiny

    14 Jan 2025

    85 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  4. CVE-2024-49112 ❤️‍🔥 Integer Overflow Vulnerability in Windows LDAP Service Leading to Unauthenticated RCE ✌🏻

    @7h3h4ckv157

    14 Jan 2025

    2732 Impressions

    8 Retweets

    73 Likes

    8 Bookmarks

    1 Reply

    0 Quotes

  5. On 12/10, Microsoft published CVE-2024-49112 & CVE-2024-49113—two LDAP vulnerabilities that affect Windows Active Directory Domain Controllers. They’ve received significant attention due to their severity and the lack of any public documentation explaining the exploitation pa

    @safebreach

    14 Jan 2025

    70 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  6. Threat Alert: Fake LDAPNightmare exploit on GitHub spreads infostealer malware CVE-2024-49112 CVE-2024-49113 CVE-2024-49138 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/ifVGosLGvd #CyberSecurity #ThreatIntel #InfoSec (1/3)

    @fletch_ai

    14 Jan 2025

    74 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  7. CVE-2024-49112 & 49113っていうAD(LDAP)脆弱性対応を 今日明日やらんといけなさそうで、準備しとった CVE-2024-26248の対応もあるから面倒で・・・ あれ?今日って祝日? めっさ仕事する気でいた月曜午前 のんきな旅行レポ読んでうっすら自覚した

    @saxmid

    13 Jan 2025

    27 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. LDAP Nightmare(CVE-2024-49112) 취약점 https://t.co/uRnv8Z9zCr

    @Moonding1

    12 Jan 2025

    16 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. Security pros baited with fake Windows LDAP exploit traps: https://t.co/dAwpIUzuOm Security researchers are being targeted with fake exploits for Microsoft vulnerabilities, specifically CVE-2024-49113 (LDAPNightmare) and CVE-2024-49112, both patched in December 2024. A… https://

    @securityRSS

    10 Jan 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. 🚩 #ciberseguridad #hacking Exploit DoS para LDAPNightmare (CVE-2024-49112) 🔒 https://t.co/cJC4WekEj5 https://t.co/1rjR8OgqcN

    @mileseceirl

    9 Jan 2025

    43 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  11. 🚨 Heads up, #CyberSecurity pros! Two critical LDAP vulnerabilities, CVE-2024-49112 (RCE-9.8) & CVE-2024-49113 (DoS-7.5), threaten Windows servers. Patch ASAP to stay secure! More info: https://t.co/ZrJzzemF6C #PatchTuesday #Infosec

    @ThreatVector24

    7 Jan 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. A critical Remote Code Execution (RCE) vulnerability has been identified in the Windows Lightweight Directory Access Protocol (LDAP), designated as CVE-2024-49112, with a CVSS score of 9.8 POC here https://t.co/5NtHITwxrt

    @intsecllc

    6 Jan 2025

    44 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  13. آسیب پذیری با کد شناسایی CVE-2024-49112 برای Windows LDAP از نوع Buffer Ovwrflow منتشر شده است. هکرها با ارسال یک درخواست دستکاری شده LDAP به سمت DC آسیب پذیر ، به دلیل وجود ضعف memory Corruption در سرویس ldap سرویس DC دچار Crash می شود. https://t.co/Poz3aKYxT1 https://t.co/2R21h

    @AmirHossein_sec

    5 Jan 2025

    50 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  14. Top 5 Trending CVEs: 1 - CVE-2024-43405 2 - CVE-2023-45866 3 - CVE-2024-49112 4 - CVE-2024-49113 5 - CVE-2024-4367 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    5 Jan 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. What We Know About CVE-2024-49112 and CVE-2024-49113 https://t.co/87OzMjqTmM

    @WhalersLtd

    4 Jan 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. Threat Alert: Critical Windows LDAP flaw could lead to crashed servers, RCE attacks CVE-2024-49112 CVE-2024-49113 CVE-2024-49138 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/ifVGosLGvd #CyberSecurity #ThreatIntel #InfoSec

    @fletch_ai

    4 Jan 2025

    38 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 🚨 IT Service Providers: Critical Windows LDAP vulnerabilities (CVE-2024-49112 & CVE-2024-49113) disclosed! Use our new metric to identify & update affected systems quickly. 📍 Admin > Metric > Windows Stay secure—together, we’ve got this! 💪 #CyberSecurit

    @LiongardHQ

    3 Jan 2025

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. LDAPNightmare: SafeBreach Labs Publishes First Proof-of-Concept Exploit for CVE-2024-49112 https://t.co/Iw71ZXLdhY

    @samilaiho

    3 Jan 2025

    1189 Impressions

    7 Retweets

    8 Likes

    2 Bookmarks

    0 Replies

    0 Quotes

  19. 🚨 LDAPNightmare PoC Exploit: CVE-2024-49113 🚨 A new PoC exploit crashes Windows Domain Controllers by targeting LSASS via CLDAP responses, causing a DoS and forced reboot. Exploit also risks RCE (CVE-2024-49112). 🛠️ Mitigation Tips: Apply December 2024 Microsoft patches… ht

    @arunpratap786

    3 Jan 2025

    64 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. CVE-2024-49112 : PoC Exploit Tool released for critical window LDAP Zero-click RCE vulnerability #LDAPNightmare https://t.co/7fjpTIzYVm

    @freedomhack101

    3 Jan 2025

    59 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  21. تم نشر استغلال PoC لثغرة CVE-2024-49113 و ثغرة CVE-2024-49112 الاولى منها تسبب هجمات حجب الخدمة DOS، والأخرى تسبب التحكم والسيطرة عن بعد، الثغرة تم تحديثها الشهر الماضي، والتحديث الان اصبح اكثر أهمية https://t.co/UKj8t1A3kS #الامن_السيبراني https://t.co/q1Hqadwb13

    @MAlajab

    3 Jan 2025

    981 Impressions

    1 Retweet

    13 Likes

    7 Bookmarks

    0 Replies

    0 Quotes

  22. SafeBreach released a writeup on Jan 1st linking CVE-2024-49112 to a DoS exploit. However, the original researcher who reported the bug to Microsoft disagrees. Find out more: https://t.co/GllDI3OPM7 #CyberSecurity #CVE202449112 #InfoSec #Microsoft

    @intruder_io

    3 Jan 2025

    71 Impressions

    2 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. 🚨 Upozorňujeme na aktivní zneužívání závažných zranitelností v protokolu Windows Lightweight Directory Access Protocol (LDAP) známé pod označením CVE-2024-49112 CVE-2024-49113. Vzdálenému autentizovanému útočníkovi je umožněno vykonávat vzdáleně kód a způsobit výpadek LSASS…

    @GOVCERT_CZ

    3 Jan 2025

    1140 Impressions

    2 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. 🚨 Upozorňujeme na aktivní zneužívání závažných zranitelností v protokolu Windows Lightweight Directory Access Protocol (LDAP) známé pod označením CVE-2024-49112 CVE-2024-49113. Vzdálenému autentizovanému útočníkovi je umožněno vykonávat vzdáleně kód a způsobit výpadek LSASS…

    @GOVCERT_CZ

    3 Jan 2025

    236 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  25. CVE-2024-49112 will soon be weaponized, DC's will fall left and right, Patch now! https://t.co/GogObKecsg Credit: https://t.co/DGG2NivPds https://t.co/zFQYxAJQhn

    @zertux6

    3 Jan 2025

    191 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  26. Investigadores de SafeBreach han publicado el código de una prueba de concepto (PoC) que se aprovecha de la #vulnerabilidad CVE-2024-49112 (CVSSv3 9.8), conocida como #LDAPNightmare https://t.co/UJ0Es6Rpvr https://t.co/3pzkkJ4nPj

    @AlexMilla_

    3 Jan 2025

    93 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. Here is the ironic side of vuln response based on CVSS score - especially when it comes to binary vulns. Everyone cares about CVE-2024-49112 because MS assigns CVSS 9.8 to this vulneraiblity, but never forget the score is highly affected by the skills of the analysis team behind

    @guhe120

    3 Jan 2025

    10549 Impressions

    3 Retweets

    39 Likes

    2 Bookmarks

    2 Replies

    2 Quotes

  28. Zero-Click Zafiyeti CVE-2024-49112: Windows Sistemlerinde Kritik RCE Açığı PoC Exploit Yayımlandı https://t.co/Ng3P8lFSw6

    @cyberwebeyeos

    3 Jan 2025

    37 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 2025-01-02 の人気記事はコチラでした。(自動ツイート) #Hacker_Trends ――― PoC Exploit Released for Zero-Click Vulnerability CVE-2024-49112 in Windows https://t.co/TGCyyGvsLm https://t.co/Ln9dgu3sdh

    @motikan2010

    3 Jan 2025

    207 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  30. #Windows: PoC Exploit Released for Zero-Click Critical #Vulnerability CVE-2024-49112 in Windows (dubbed "LDAP Nightmare"). This vulnerability affects all unpatched versions of Windows Server, from Windows Server 2019 to 2022: 👇 https://t.co/lHCwUY3bcP

    @securestep9

    2 Jan 2025

    963 Impressions

    5 Retweets

    11 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  31. First PoC Exploit of 2025 CVE-2024-49112 CVSS Score 9.8 (“LDAP Nightmare”) Mitigation Steps: 1️⃣ Apply the patch immediately: Microsoft’s December 2024 Patch Tuesday addresses this flaw. 2️⃣ Monitor networks: Watch for anomalous LDAP traffic, DNS SRV queries, and CLDAP responses.

    @BattalFaikAktas

    2 Jan 2025

    196 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    1 Quote

  32. Exploit DoS para LDAP Nightmare (CVE-2024-49112) Vulnerabilidad crítica en el cliente LDAP de Windows que según Microsoft permite la ejecución remota de código https://t.co/o9GDBxuDt2

    @elhackernet

    2 Jan 2025

    4977 Impressions

    33 Retweets

    115 Likes

    25 Bookmarks

    0 Replies

    0 Quotes

  33. LDAPNightmare : First Proof-of-Concept Exploit for CVE-2024-49112 : https://t.co/Apfh6B6Wz4 credits @oryair1999 @ShahakMo LdapNightmare : a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112 : https://t.co/vfZ3Yxu3Z8 https://t.co/OVnFQgm7wZ

    @binitamshah

    2 Jan 2025

    16752 Impressions

    72 Retweets

    303 Likes

    171 Bookmarks

    1 Reply

    0 Quotes

  34. WindowsのLDAPNightmare脆弱性(CVE-2024-49112)に対応するゼロクリックPoC(攻撃の概念実証コード)をSafeBreach社が公表。CVE-2024-49112はCVSSスコア9.8で、マイクロソフトが2024年10月の定例更新で修正したもの。 https://t.co/nrQTlbNmJX

    @__kokumoto

    2 Jan 2025

    2468 Impressions

    12 Retweets

    21 Likes

    15 Bookmarks

    0 Replies

    0 Quotes

  35. Detect exploitation attempts of CVE-2024-49112, a critical LDAP Remote Code Execution (RCE) vulnerability that can severely impact unpatched Windows servers, with a set of Sigma rules from SOC Prime. #cybersecurity #infosec https://t.co/XSV6epl6dL

    @SOC_Prime

    2 Jan 2025

    146 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. CVE-2024-49112 https://t.co/L77lKwMb0h https://t.co/uCPKh41zbZ

    @electrocode

    2 Jan 2025

    299 Impressions

    0 Retweets

    1 Like

    2 Bookmarks

    0 Replies

    0 Quotes

  37. 🚨 The first PoC exploit of 2025 is here, targeting a major #Windows #vulnerability, CVE-2024-49112. With a CVSS score of 9.8 it is also known as "LDAP Nightmare." 🚨 This zero-click exploit poses a severe risk to networks, especially those running ADDS. https://t.co/58g8D30jgi

    @cyb3rint3l

    2 Jan 2025

    106 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    1 Reply

    0 Quotes

  38. CVE-2024-49112 POC Code Released #CVE-2024-49112 #LDAPNightmare #POCExploitCode https://t.co/T00mwvwj4T

    @pravin_karthik

    2 Jan 2025

    77 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  39. PoC para CVE-2024-49112.  Se trata de una vulnerabilidad en el protocolo ligero de acceso a directorios #LDAP de #Windows. Creado por SafeBreach Labs (publicado el 1 de enero de 2025). Para obtener el análisis técnico completo de la vulnerabilidad https://t.co/gylAER34kf

    @Race_Banon

    2 Jan 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. عجب CVE-2024-49112 باحالی هست یک آسیب‌پذیری بحرانی در پروتکل LDAP است که امکان اجرای کد از راه دور را برای مهاجمان از CVSS 9.8 فراهم می‌کند. این آسیب‌پذیری با امتیاز 10 ارزیابی شده است که نشان‌دهنده شدت بالای آن است.

    @l0ni7_ir

    2 Jan 2025

    216 Impressions

    0 Retweets

    8 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  41. As someone asked for clarification, to avoid confusion, the PoC by SafeBreach that they named "LDAPNightmare" is not CVE-2024-49112 but another LDAP information leak bug fixed in the same month. How about now finding C2 Servers that pass LDAP, Malware and Botnets with a Tracker.

    @byt3n33dl3

    2 Jan 2025

    108 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. CVE-2024-49112 LDAP Nightmare (DoS) https://t.co/BiFETmXk61

    @zalepentester

    2 Jan 2025

    82 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. Windows LDAP critical update #LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112 #windows #ldap https://t.co/6z1hMiPC7v

    @freedom4_beings

    2 Jan 2025

    52 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  44. As someone asked for clarification, to avoid confusion, the PoC by SafeBreach that they named "LDAPNightmare" is not CVE-2024-49112 but another LDAP information leak bug fixed in the same month

    @guhe120

    2 Jan 2025

    17371 Impressions

    23 Retweets

    104 Likes

    22 Bookmarks

    3 Replies

    3 Quotes

  45. LDAPNightmare: SafeBreach Publishes First PoC Exploit (CVE-2024-49112) https://t.co/JCjWhWYx9m

    @stephenmarriott

    2 Jan 2025

    67 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  46. Top 5 Trending CVEs: 1 - CVE-2024-49112 2 - CVE-2010-5139 3 - CVE-2024-49019 4 - CVE-2024-11944 5 - CVE-2024-8534 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    2 Jan 2025

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. URGENT: First PoC Exploit of 2025 Targets Critical Windows Vulnerability CVE-2024-49112 CVSS Score 9.8 (“LDAP Nightmare”) Affected Systems: All unpatched versions of Windows Server (2019–2022). https://t.co/yMrgs34xCf

    @hackstacksec

    2 Jan 2025

    810 Impressions

    1 Retweet

    9 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  48. LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49112 https://t.co/RjFF86g3Tz https://t.co/R1DLZqV75I

    @blackorbird

    2 Jan 2025

    2839 Impressions

    2 Retweets

    17 Likes

    10 Bookmarks

    1 Reply

    0 Quotes

  49. LDAPNightmare: SafeBreach Publishes First PoC Exploit (CVE-2024-49112) https://t.co/mVcUf9YVar

    @cybersec4

    2 Jan 2025

    42 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. CVE-2024-49112: Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability https://t.co/ntIdWBKYPh https://t.co/db4qfG5PHg

    @cyber_advising

    2 Jan 2025

    246 Impressions

    1 Retweet

    4 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

Configurations