RDL vulnerability in Microsoft Server closed – CVE-2024-38077

On 9th August 2024, a vulnerability was published in the ‘Remote Desktop Licensing’ role service that allows unauthenticated attackers to remotely execute arbitrary code in the context of the service using a buffer overflow. Microsoft closed the vulnerability on Patchday July 2024 and rated the vulnerability as ‘high’ (CVSS score 9.8), but considers exploitation to be rather unlikely.

All versions of Windows Server are affected. RDL is not activated by default. For users of the HIGH-LEIT control system from VIVAVIS AG, RDL is only activated if a terminal server is in use.  The corresponding terminal servers are not directly accessible from the Internet, but only via VPN. The attack vector can therefore be categorised as low. 

We recommend that all users of HIGH-LEIT with a terminal server update to the latest version as soon as possible. If you have any further questions or require support, please contact our costumer centre.

Ansprechpartner
Peter Schwark


RSS-Feed

Our RSS feed always keeps you up to date! This way, you’ll receive same-day notification when a new article has been posted to the IT Security Bulletin. Just enter the following link in your feed reader: https://www.vivavis.com/en/category/it-security-en/feed/

You can find out how to integrate the RSS feed into Outlook here.

Call now
Call now +49 7243 218 0
Send Mail
Send Mail info@vivavis.com
Locations & Contact
Locations & Contact Explore now