CVE-2024-49113

Published Dec 12, 2024

Last updated a month ago

Overview

Description
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
Source
secure@microsoft.com
NVD status
Received

Risk scores

CVSS 3.1

Type
Primary
Base score
7.5
Impact score
3.6
Exploitability score
3.9
Vector string
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Severity
HIGH

Weaknesses

secure@microsoft.com
CWE-125

Social media

Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.

Hype score

3

  1. Created a #KQL hunting query to list the initial LDAPNightmare exploit (CVE-2024-49113) connection. With this, you can hunt for both successful and failed exploitation attempts 🏹 https://t.co/GNauTRwJCI

    @BertJanCyber

    6 Jan 2025

    1698 Impressions

    10 Retweets

    57 Likes

    20 Bookmarks

    1 Reply

    1 Quote

  2. The recently discovered LDAP vulnerability in Microsoft Active Directory (CVE-2024-49113) can allow attackers to bypass defenses and compromise domain controllers instantly. The patch is out, but is your organization ready to respond? https://t.co/6gUpy5jN78

    @Shift6Security

    6 Jan 2025

    9 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  3. LdapNightmare هي أداة إثبات المفهوم (PoC) تختبر خادم Windows Server المعرض للثغرة ضد CVE-2024-49113. https://t.co/g2QpZdk4wv https://t.co/LQ7N2CddpW https://t.co/0EEufxt8gJ

    @TareqALhazzaa

    6 Jan 2025

    1062 Impressions

    8 Retweets

    55 Likes

    19 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨🚨CVE-2024-49113: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability ZoomEye Dork👉title="Windows Server" 5m+ results are found on ZoomEye. ZoomEye Link: https://t.co/YNygCCyeaT Refer: https://t.co/QNgK4e87Vx Refer: https://t.co/r7gnbC5r3w…

    @zoomeye_team

    6 Jan 2025

    367 Impressions

    1 Retweet

    6 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  5. Top 5 Trending CVEs: 1 - CVE-2023-32434 2 - CVE-2024-49113 3 - CVE-2024-43405 4 - CVE-2024-10957 5 - CVE-2024-30078 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    6 Jan 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. 🚨Alert🚨 CVE-2024-49113 : Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability 🔥PoC :https://t.co/9eDjyuJj5S 📊 302.9m+ Services are found on https://t.co/ysWb28BTvF yearly. 🔗Hunter Link: https://t.co/CyIRQG22AY 👇Query HUNTER… https://t.co/n2es

    @HunterMapping

    6 Jan 2025

    4552 Impressions

    26 Retweets

    106 Likes

    45 Bookmarks

    0 Replies

    0 Quotes

  7. Top 5 Trending CVEs: 1 - CVE-2024-43405 2 - CVE-2023-45866 3 - CVE-2024-49112 4 - CVE-2024-49113 5 - CVE-2024-4367 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W

    @CVEShield

    5 Jan 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  8. CVE-2024-49113에 대한 최초의 컨셉 증명 플로잇을 공개합니다. https://t.co/mtA5BpIkFd

    @YoonjaeN21

    5 Jan 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  9. LDAPNightmare: SafeBreach Labs가 CVE-2024-49113에 대한 최초의 개념 증명 익스플로잇을 공개 https://t.co/R52baVULGw

    @YoonjaeN21

    5 Jan 2025

    13 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. 🚨Added some new blogs and proof-of-concept exploits to CyberSecFolio including CVE-2022-41924 and CVE-2024-49113. 🛠️ #infosec #cyber #security https://t.co/Lh84qxOSWh

    @gothburz

    4 Jan 2025

    50 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  11. Vulnerabilities - Exploit Code Published for Potentially Dangerous Windows LDAP Vulnerability Proof-of-concept (PoC) code was published for CVE-2024-49113, a denial-of-service (DoS) vulnerability in Windows LDAP. https://t.co/7byL2pVKu3

    @HackingIsland

    4 Jan 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  12. CVE-2024-49113: Mitigating the LDAPNightmare Vulnerability in Windows Servers https://t.co/FQnR9Uv6MZ

    @windowsforum

    4 Jan 2025

    49 Impressions

    1 Retweet

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  13. What We Know About CVE-2024-49112 and CVE-2024-49113 https://t.co/87OzMjqTmM

    @WhalersLtd

    4 Jan 2025

    4 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. Threat Alert: Critical Windows LDAP flaw could lead to crashed servers, RCE attacks CVE-2024-49112 CVE-2024-49113 CVE-2024-49138 Severity: ⚠️ Critical Maturity: 💥 Mainstream Learn more: https://t.co/ifVGosLGvd #CyberSecurity #ThreatIntel #InfoSec

    @fletch_ai

    4 Jan 2025

    38 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  15. 🚨 Nouvel exploit LDAPNightmare provoquant un crash du LSASS et redémarrage des contrôleurs de domaine Windows ! CVE-2024-49113 impactant le LDAP Windows. Une faille à haut risque à surveiller pour les Analystes Sécurité. #cybersécurité #alerte #CVE 👉 https://t.co/3gAeYDVkaf

    @CyberAlertFr

    4 Jan 2025

    36 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. 🚨 IT Service Providers: Critical Windows LDAP vulnerabilities (CVE-2024-49112 & CVE-2024-49113) disclosed! Use our new metric to identify & update affected systems quickly. 📍 Admin > Metric > Windows Stay secure—together, we’ve got this! 💪 #CyberSecurit

    @LiongardHQ

    3 Jan 2025

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. 🔴 L'attaque LDAP Nightmare menace les contrôleurs de domaine Active Directory puisqu'un exploit PoC a été publié pour la CVE-2024-49113, une faille de sécurité importante présente dans Windows Server ! Quels sont les risques ?  Via @ITConnect_fr https://t.co/GCXCaoyCRy https://

    @argevise

    3 Jan 2025

    15 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Seeing news about technical issues at the German airports - maybe because I just finished reading some vulnerability management Intel, it feels that CVE-2024-49113 (and the recently developed PoC) might have been involved. Pure speculation on my behalf though.

    @dkulshitsky

    3 Jan 2025

    76 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  19. 🚨 New Threat Alert: The LDAPNightmare (CVE-2024-49113) can crash unpatched Windows Servers via denial-of-service—potential RCE risk too. Patch NOW or monitor for suspicious activity! #CyberSecurity #Windows More info: https://t.co/a8QkW0XzKg

    @ThreatVector24

    3 Jan 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  20. 🚨 LDAPNightmare PoC Exploit: CVE-2024-49113 🚨 A new PoC exploit crashes Windows Domain Controllers by targeting LSASS via CLDAP responses, causing a DoS and forced reboot. Exploit also risks RCE (CVE-2024-49112). 🛠️ Mitigation Tips: Apply December 2024 Microsoft patches… ht

    @arunpratap786

    3 Jan 2025

    64 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  21. تم نشر استغلال PoC لثغرة CVE-2024-49113 و ثغرة CVE-2024-49112 الاولى منها تسبب هجمات حجب الخدمة DOS، والأخرى تسبب التحكم والسيطرة عن بعد، الثغرة تم تحديثها الشهر الماضي، والتحديث الان اصبح اكثر أهمية https://t.co/UKj8t1A3kS #الامن_السيبراني https://t.co/q1Hqadwb13

    @MAlajab

    3 Jan 2025

    981 Impressions

    1 Retweet

    13 Likes

    7 Bookmarks

    0 Replies

    0 Quotes

  22. Patch Windows servers immediately to protect against the LDAPNightmare exploit targeting CVE-2024-49113.

    @DiGiForces

    3 Jan 2025

    47 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  23. LDAPNightmare: SafeBreach Publishes First PoC Exploit (CVE-2024-49113) https://t.co/gKGF5m2BSh #VulnerabilityManagement

    @Cyber_Root_

    3 Jan 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  24. CVE-2024-49113: PoC Exploit Code Released #CVE-2024-49113 #PoCExploitCode #DoSAttack #Microsoft https://t.co/Zuf7ZqNUPg

    @pravin_karthik

    3 Jan 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. 🚨 CVE-2024-49113: A critical Windows LDAP vulnerability allows attackers to crash unpatched servers, leading to potential service disruptions. SafeBreach Labs has released a proof-of-concept exploit demonstrating this risk. #infosec #security

    @prakharvr02

    3 Jan 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. 🚨 Upozorňujeme na aktivní zneužívání závažných zranitelností v protokolu Windows Lightweight Directory Access Protocol (LDAP) známé pod označením CVE-2024-49112 CVE-2024-49113. Vzdálenému autentizovanému útočníkovi je umožněno vykonávat vzdáleně kód a způsobit výpadek LSASS…

    @GOVCERT_CZ

    3 Jan 2025

    1140 Impressions

    2 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  27. #LDAPNightmare, a #PoC #exploit targets #Windows #LDAP #flaw CVE-2024-49113 https://t.co/wmSRkTvUpm https://t.co/TC53kSScBy

    @omvapt

    3 Jan 2025

    66 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  28. 🚨 Upozorňujeme na aktivní zneužívání závažných zranitelností v protokolu Windows Lightweight Directory Access Protocol (LDAP) známé pod označením CVE-2024-49112 CVE-2024-49113. Vzdálenému autentizovanému útočníkovi je umožněno vykonávat vzdáleně kód a způsobit výpadek LSASS…

    @GOVCERT_CZ

    3 Jan 2025

    236 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  29. 🚨 Exploit code for the Windows LDAP vulnerability CVE-2024-49113 is now public! Unpatched servers risk crashes from crafted requests, raising serious security alarm. #WindowsSecurity #CVE2024 #USA #CybersecurityNews link: https://t.co/LyrZiiqVow https://t.co/XogWXixAzm

    @TweetThreatNews

    3 Jan 2025

    58 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  30. CVE-2024-49113: test whether your environment is potentially vulnerable to CVE-2024-49113 (LDAP Nightmare). This script performs: RPC connectivity checks LDAP port tests Netlogon service validation LDAP callback verification https://t.co/OuUOxnXmie https://t.co/hMgdHkcXuQ

    @cyber_advising

    3 Jan 2025

    3322 Impressions

    21 Retweets

    77 Likes

    28 Bookmarks

    0 Replies

    1 Quote

  31. LDAPNightmare, a PoC exploit targets Windows LDAP flaw CVE-2024-49113 https://t.co/fpt93V0HOK

    @itsecuritynewsl

    3 Jan 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  32. A new PoC exploit, LDAPNightmare, targets a critical Windows LDAP vulnerability (CVE-2024-49113), causing crashes & reboots. Unpatched systems are at high risk! 🛡️💻 #WindowsServers #RemoteExploitation #USA #CybersecurityNews link: https://t.co/XvyivdcTD9 https://t.co/D21I5

    @TweetThreatNews

    3 Jan 2025

    58 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  33. Można przejmować Windows Serwery bez uwierzytelnienia. RCE: CVE-2024-49113 ❌ Jedyne wymaganie - serwer DNS używany przez ofiarę ma dostęp do Internetu ❌ Pojawił się na razie exploit "wywalający" cel (czyli DoS) ❌ Microsoft w informacji o błędzie pisze o tym, że jest to… https:

    @Sekurak

    3 Jan 2025

    6232 Impressions

    13 Retweets

    70 Likes

    12 Bookmarks

    0 Replies

    1 Quote

  34. Windows 0day CVE-2024-49113 PoC 已发布 https://t.co/XglJjjh1fk https://t.co/QIXjbO4Grs

    @gov_hack

    3 Jan 2025

    507 Impressions

    0 Retweets

    5 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  35. CVE-2024-49113 poc https://t.co/W1eDD6yrrh

    @kang9693na25429

    3 Jan 2025

    38 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  36. SafeBreach Labs developed a proof of concept exploit for CVE-2024-49113 that crashes any unpatched Windows Server (not just DCs) with no pre-requisites except that the DNS server of the victim DC has Internet connectivity. https://t.co/iTZgRA8HNG

    @GsInfosystems

    3 Jan 2025

    77 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  37. The POC for CVE-2024-49113 is out by Safe-breach More details in: https://t.co/J2C92dQUuf

    @GrimmAnalyst

    3 Jan 2025

    34 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. LDAPNightmare: SafeBreach Labs Publishes First Proof-of-Concept Exploit for CVE-2024-49113 https://t.co/qaYBYubXWm https://t.co/XlRZ2golGN

    @ptracesecurity

    3 Jan 2025

    2398 Impressions

    19 Retweets

    59 Likes

    17 Bookmarks

    0 Replies

    0 Quotes

  39. A critical Active Directory flaw (CVE-2024-49113) could crash unpatched Microsoft servers, risking denial-of-service attacks. Immediate patching is crucial for organizations. ⚠️ #WindowsServers #DataBreach #USA #CybersecurityNews link: https://t.co/4cKOyZewM6 https://t.co/MD57JO

    @TweetThreatNews

    2 Jan 2025

    116 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  40. Amazing blog article: Proof-of-Concept Exploit for CVE-2024-49113 - Windows Server LDAP Vulnerability! Check it live: https://t.co/Yx86L646sx

    @usocca

    2 Jan 2025

    50 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. 🚨 URGENT: A critical #Windows vulnerability, CVE-2024-49113 ("LDAP Nightmare"), has been exploited with a PoC for Remote Code Execution (RCE). Affects Windows Server 2019-2022 & Active Directory DCs. #CyberSecurity #WindowsVuln #RCE #CVE #LDAPNightmare

    @services27600

    2 Jan 2025

    154 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  42. LDAP 噩梦 CVE-2024-49113 是 Windows LDAP 客户端中的一个严重漏洞,据 Microsoft 称,该漏洞允许远程执行代码。此漏洞利用该漏洞通过与 Netlogon 远程协议 (NRPC) 和 LDAP 客户端交互来使目标 Windows Server 系统崩溃。 https://t.co/1JD5gIGiZ6

    @wy88215534

    2 Jan 2025

    41 Impressions

    1 Retweet

    1 Like

    1 Bookmark

    0 Replies

    0 Quotes