- Description
- Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Received
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- secure@microsoft.com
- CWE-125
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
3
Created a #KQL hunting query to list the initial LDAPNightmare exploit (CVE-2024-49113) connection. With this, you can hunt for both successful and failed exploitation attempts 🏹 https://t.co/GNauTRwJCI
@BertJanCyber
6 Jan 2025
1698 Impressions
10 Retweets
57 Likes
20 Bookmarks
1 Reply
1 Quote
The recently discovered LDAP vulnerability in Microsoft Active Directory (CVE-2024-49113) can allow attackers to bypass defenses and compromise domain controllers instantly. The patch is out, but is your organization ready to respond? https://t.co/6gUpy5jN78
@Shift6Security
6 Jan 2025
9 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
LdapNightmare هي أداة إثبات المفهوم (PoC) تختبر خادم Windows Server المعرض للثغرة ضد CVE-2024-49113. https://t.co/g2QpZdk4wv https://t.co/LQ7N2CddpW https://t.co/0EEufxt8gJ
@TareqALhazzaa
6 Jan 2025
1062 Impressions
8 Retweets
55 Likes
19 Bookmarks
0 Replies
0 Quotes
🚨🚨CVE-2024-49113: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability ZoomEye Dork👉title="Windows Server" 5m+ results are found on ZoomEye. ZoomEye Link: https://t.co/YNygCCyeaT Refer: https://t.co/QNgK4e87Vx Refer: https://t.co/r7gnbC5r3w…
@zoomeye_team
6 Jan 2025
367 Impressions
1 Retweet
6 Likes
4 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2023-32434 2 - CVE-2024-49113 3 - CVE-2024-43405 4 - CVE-2024-10957 5 - CVE-2024-30078 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
6 Jan 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Alert🚨 CVE-2024-49113 : Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability 🔥PoC :https://t.co/9eDjyuJj5S 📊 302.9m+ Services are found on https://t.co/ysWb28BTvF yearly. 🔗Hunter Link: https://t.co/CyIRQG22AY 👇Query HUNTER… https://t.co/n2es
@HunterMapping
6 Jan 2025
4552 Impressions
26 Retweets
106 Likes
45 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2024-43405 2 - CVE-2023-45866 3 - CVE-2024-49112 4 - CVE-2024-49113 5 - CVE-2024-4367 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
5 Jan 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49113에 대한 최초의 컨셉 증명 플로잇을 공개합니다. https://t.co/mtA5BpIkFd
@YoonjaeN21
5 Jan 2025
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
LDAPNightmare: SafeBreach Labs가 CVE-2024-49113에 대한 최초의 개념 증명 익스플로잇을 공개 https://t.co/R52baVULGw
@YoonjaeN21
5 Jan 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨Added some new blogs and proof-of-concept exploits to CyberSecFolio including CVE-2022-41924 and CVE-2024-49113. 🛠️ #infosec #cyber #security https://t.co/Lh84qxOSWh
@gothburz
4 Jan 2025
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Vulnerabilities - Exploit Code Published for Potentially Dangerous Windows LDAP Vulnerability Proof-of-concept (PoC) code was published for CVE-2024-49113, a denial-of-service (DoS) vulnerability in Windows LDAP. https://t.co/7byL2pVKu3
@HackingIsland
4 Jan 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49113: Mitigating the LDAPNightmare Vulnerability in Windows Servers https://t.co/FQnR9Uv6MZ
@windowsforum
4 Jan 2025
49 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
What We Know About CVE-2024-49112 and CVE-2024-49113 https://t.co/87OzMjqTmM
@WhalersLtd
4 Jan 2025
4 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Threat Alert: Critical Windows LDAP flaw could lead to crashed servers, RCE attacks CVE-2024-49112 CVE-2024-49113 CVE-2024-49138 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/ifVGosLGvd #CyberSecurity #ThreatIntel #InfoSec
@fletch_ai
4 Jan 2025
38 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Nouvel exploit LDAPNightmare provoquant un crash du LSASS et redémarrage des contrôleurs de domaine Windows ! CVE-2024-49113 impactant le LDAP Windows. Une faille à haut risque à surveiller pour les Analystes Sécurité. #cybersécurité #alerte #CVE 👉 https://t.co/3gAeYDVkaf
@CyberAlertFr
4 Jan 2025
36 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 IT Service Providers: Critical Windows LDAP vulnerabilities (CVE-2024-49112 & CVE-2024-49113) disclosed! Use our new metric to identify & update affected systems quickly. 📍 Admin > Metric > Windows Stay secure—together, we’ve got this! 💪 #CyberSecurit
@LiongardHQ
3 Jan 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 L'attaque LDAP Nightmare menace les contrôleurs de domaine Active Directory puisqu'un exploit PoC a été publié pour la CVE-2024-49113, une faille de sécurité importante présente dans Windows Server ! Quels sont les risques ? Via @ITConnect_fr https://t.co/GCXCaoyCRy https://
@argevise
3 Jan 2025
15 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Seeing news about technical issues at the German airports - maybe because I just finished reading some vulnerability management Intel, it feels that CVE-2024-49113 (and the recently developed PoC) might have been involved. Pure speculation on my behalf though.
@dkulshitsky
3 Jan 2025
76 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 New Threat Alert: The LDAPNightmare (CVE-2024-49113) can crash unpatched Windows Servers via denial-of-service—potential RCE risk too. Patch NOW or monitor for suspicious activity! #CyberSecurity #Windows More info: https://t.co/a8QkW0XzKg
@ThreatVector24
3 Jan 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 LDAPNightmare PoC Exploit: CVE-2024-49113 🚨 A new PoC exploit crashes Windows Domain Controllers by targeting LSASS via CLDAP responses, causing a DoS and forced reboot. Exploit also risks RCE (CVE-2024-49112). 🛠️ Mitigation Tips: Apply December 2024 Microsoft patches… ht
@arunpratap786
3 Jan 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
تم نشر استغلال PoC لثغرة CVE-2024-49113 و ثغرة CVE-2024-49112 الاولى منها تسبب هجمات حجب الخدمة DOS، والأخرى تسبب التحكم والسيطرة عن بعد، الثغرة تم تحديثها الشهر الماضي، والتحديث الان اصبح اكثر أهمية https://t.co/UKj8t1A3kS #الامن_السيبراني https://t.co/q1Hqadwb13
@MAlajab
3 Jan 2025
981 Impressions
1 Retweet
13 Likes
7 Bookmarks
0 Replies
0 Quotes
Patch Windows servers immediately to protect against the LDAPNightmare exploit targeting CVE-2024-49113.
@DiGiForces
3 Jan 2025
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
LDAPNightmare: SafeBreach Publishes First PoC Exploit (CVE-2024-49113) https://t.co/gKGF5m2BSh #VulnerabilityManagement
@Cyber_Root_
3 Jan 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49113: PoC Exploit Code Released #CVE-2024-49113 #PoCExploitCode #DoSAttack #Microsoft https://t.co/Zuf7ZqNUPg
@pravin_karthik
3 Jan 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2024-49113: A critical Windows LDAP vulnerability allows attackers to crash unpatched servers, leading to potential service disruptions. SafeBreach Labs has released a proof-of-concept exploit demonstrating this risk. #infosec #security
@prakharvr02
3 Jan 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Upozorňujeme na aktivní zneužívání závažných zranitelností v protokolu Windows Lightweight Directory Access Protocol (LDAP) známé pod označením CVE-2024-49112 CVE-2024-49113. Vzdálenému autentizovanému útočníkovi je umožněno vykonávat vzdáleně kód a způsobit výpadek LSASS…
@GOVCERT_CZ
3 Jan 2025
1140 Impressions
2 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
#LDAPNightmare, a #PoC #exploit targets #Windows #LDAP #flaw CVE-2024-49113 https://t.co/wmSRkTvUpm https://t.co/TC53kSScBy
@omvapt
3 Jan 2025
66 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Upozorňujeme na aktivní zneužívání závažných zranitelností v protokolu Windows Lightweight Directory Access Protocol (LDAP) známé pod označením CVE-2024-49112 CVE-2024-49113. Vzdálenému autentizovanému útočníkovi je umožněno vykonávat vzdáleně kód a způsobit výpadek LSASS…
@GOVCERT_CZ
3 Jan 2025
236 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Exploit code for the Windows LDAP vulnerability CVE-2024-49113 is now public! Unpatched servers risk crashes from crafted requests, raising serious security alarm. #WindowsSecurity #CVE2024 #USA #CybersecurityNews link: https://t.co/LyrZiiqVow https://t.co/XogWXixAzm
@TweetThreatNews
3 Jan 2025
58 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-49113: test whether your environment is potentially vulnerable to CVE-2024-49113 (LDAP Nightmare). This script performs: RPC connectivity checks LDAP port tests Netlogon service validation LDAP callback verification https://t.co/OuUOxnXmie https://t.co/hMgdHkcXuQ
@cyber_advising
3 Jan 2025
3322 Impressions
21 Retweets
77 Likes
28 Bookmarks
0 Replies
1 Quote
LDAPNightmare, a PoC exploit targets Windows LDAP flaw CVE-2024-49113 https://t.co/fpt93V0HOK
@itsecuritynewsl
3 Jan 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A new PoC exploit, LDAPNightmare, targets a critical Windows LDAP vulnerability (CVE-2024-49113), causing crashes & reboots. Unpatched systems are at high risk! 🛡️💻 #WindowsServers #RemoteExploitation #USA #CybersecurityNews link: https://t.co/XvyivdcTD9 https://t.co/D21I5
@TweetThreatNews
3 Jan 2025
58 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Można przejmować Windows Serwery bez uwierzytelnienia. RCE: CVE-2024-49113 ❌ Jedyne wymaganie - serwer DNS używany przez ofiarę ma dostęp do Internetu ❌ Pojawił się na razie exploit "wywalający" cel (czyli DoS) ❌ Microsoft w informacji o błędzie pisze o tym, że jest to… https:
@Sekurak
3 Jan 2025
6232 Impressions
13 Retweets
70 Likes
12 Bookmarks
0 Replies
1 Quote
Windows 0day CVE-2024-49113 PoC 已发布 https://t.co/XglJjjh1fk https://t.co/QIXjbO4Grs
@gov_hack
3 Jan 2025
507 Impressions
0 Retweets
5 Likes
1 Bookmark
0 Replies
0 Quotes
CVE-2024-49113 poc https://t.co/W1eDD6yrrh
@kang9693na25429
3 Jan 2025
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
SafeBreach Labs developed a proof of concept exploit for CVE-2024-49113 that crashes any unpatched Windows Server (not just DCs) with no pre-requisites except that the DNS server of the victim DC has Internet connectivity. https://t.co/iTZgRA8HNG
@GsInfosystems
3 Jan 2025
77 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The POC for CVE-2024-49113 is out by Safe-breach More details in: https://t.co/J2C92dQUuf
@GrimmAnalyst
3 Jan 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
LDAPNightmare: SafeBreach Labs Publishes First Proof-of-Concept Exploit for CVE-2024-49113 https://t.co/qaYBYubXWm https://t.co/XlRZ2golGN
@ptracesecurity
3 Jan 2025
2398 Impressions
19 Retweets
59 Likes
17 Bookmarks
0 Replies
0 Quotes
A critical Active Directory flaw (CVE-2024-49113) could crash unpatched Microsoft servers, risking denial-of-service attacks. Immediate patching is crucial for organizations. ⚠️ #WindowsServers #DataBreach #USA #CybersecurityNews link: https://t.co/4cKOyZewM6 https://t.co/MD57JO
@TweetThreatNews
2 Jan 2025
116 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Amazing blog article: Proof-of-Concept Exploit for CVE-2024-49113 - Windows Server LDAP Vulnerability! Check it live: https://t.co/Yx86L646sx
@usocca
2 Jan 2025
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 URGENT: A critical #Windows vulnerability, CVE-2024-49113 ("LDAP Nightmare"), has been exploited with a PoC for Remote Code Execution (RCE). Affects Windows Server 2019-2022 & Active Directory DCs. #CyberSecurity #WindowsVuln #RCE #CVE #LDAPNightmare
@services27600
2 Jan 2025
154 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
LDAP 噩梦 CVE-2024-49113 是 Windows LDAP 客户端中的一个严重漏洞,据 Microsoft 称,该漏洞允许远程执行代码。此漏洞利用该漏洞通过与 Netlogon 远程协议 (NRPC) 和 LDAP 客户端交互来使目标 Windows Server 系统崩溃。 https://t.co/1JD5gIGiZ6
@wy88215534
2 Jan 2025
41 Impressions
1 Retweet
1 Like
1 Bookmark
0 Replies
0 Quotes