CVE Radar Logo
CVERadar
CVE Radar Logo
CVERadar

CVE-2024-43533

Medium Severity
Microsoft
SVRS
30/100

CVSSv3
8.8/10

EPSS
0.02401/1

CVE-2024-43533 is a Remote Code Execution vulnerability in Remote Desktop Client. This flaw allows attackers to execute arbitrary code on a target system. Despite a CVSS score of 8.8, the SOCRadar Vulnerability Risk Score (SVRS) is 30, indicating a lower level of active threat intelligence currently. The vulnerability stems from a use-after-free condition, categorized as CWE-416. While actively exploited in the wild, the relatively low SVRS suggests limited current exploitation compared to the potential impact. Successful exploitation could lead to full system compromise. Organizations should apply available vendor patches promptly to mitigate this risk.

In The Wild
Vendor-advisory
CVSS:3.1
AV:N
AC:L
PR:N
UI:R
S:U
C:H
I:H
A:H
E:U
RL:O
RC:C
2024-10-08

2025-01-29
Eye Icon
SOCRadar
AI Insight

Description

CVE-2024-43533 describes a critical vulnerability in the Remote Desktop Client, allowing for remote code execution. This vulnerability could enable attackers to gain unauthorized access to affected systems and potentially steal sensitive data, install malware, or disrupt operations. Despite the high CVSS score of 8.8, SOCRadar's unique SVRS assigns a score of 30, suggesting a lower immediate risk. This discrepancy highlights the potential for a more nuanced understanding of vulnerability risk beyond traditional quantitative assessments.

Key Insights

  • Active Exploitation: This vulnerability is actively exploited in the wild, meaning attackers are currently using it to compromise systems.
  • Remote Code Execution: The vulnerability allows attackers to execute arbitrary code remotely, potentially granting them full control over the affected system.
  • Wide Impact: Remote Desktop Client is a widely used software, potentially impacting a large number of organizations and individuals.

Mitigation Strategies

  • Patching: Apply the latest security updates for the Remote Desktop Client software as soon as possible.
  • Network Segmentation: Implement network segmentation to isolate the Remote Desktop Client and other critical systems, limiting the potential damage from a successful attack.
  • Multi-Factor Authentication: Enable multi-factor authentication (MFA) for all Remote Desktop connections to increase the difficulty for attackers to gain access.
  • Regular Security Audits: Conduct regular security audits to identify and address potential vulnerabilities within your network and systems.

Additional Information

If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.

Indicators of Compromise

No IOCs found for this CVE

Exploits

No exploits found for this CVE

Enhance Your CVE Management with SOCRadar Vulnerability Intelligence
Get comprehensive CVE details, real-time notifications, and proactive threat management all in one platform.
CVE Details
Access comprehensive CVE information instantly
Real-time Tracking
Subscribe to CVEs and get instant updates
Exploit Analysis
Monitor related APT groups and threats
IOC Tracking
Analyze and track CVE-related IOCs

News

CVE-2024-43533 | Microsoft Windows up to Server 2022 23H2 Remote Desktop Client use after free
vuldb.com2025-03-08
CVE-2024-43533 | Microsoft Windows up to Server 2022 23H2 Remote Desktop Client use after free | A vulnerability has been found in Microsoft Windows up to Server 2022 23H2 and classified as critical. This vulnerability affects unknown code of the component Remote Desktop Client. The manipulation leads to use after free. This vulnerability was named CVE-2024-43533. The attack can be initiated remotely
vuldb.com
rss
forum
news
The October 2024 Security Update Review
Dustin Childs2024-12-02
The October 2024 Security Update Review | It’s the spooky season, and there’s nothing spookier than security patches – at least in my world. Microsoft and Adobe have released their latest patches, and no bones about it, there are some skeletons in those closets. Take a break from your regular activities and join us as we review the details of their latest security alerts. If you’d rather watch the full video recap covering the entire release, you can check it out here: Adobe Patches for
zerodayinitiative.com
rss
forum
news
Tripwire Patch Priority Index for October 2024 - tripwire.com
2024-11-05
Tripwire Patch Priority Index for October 2024 - tripwire.com | Description: Tripwire's October 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. | News Content: Image Tripwire's October 2024 Patch Priority Index (PPI) brings together important vulnerabilities for Microsoft. First on the list are patches for Microsoft Edge, Office, Excel, and Visio that resolve remote code execution, elevation of privilege, and spoofing vulnerabilities. Next are patches that affect components of the core Windows operating system. These patches resolve over 80 vulnerabilities, including elevation of privilege, information disclosure, security feature bypass, denial of service, and remote code execution vulnerabilities. These
google.com
rss
forum
news
Patch Tuesday - October 2024
Adam Barnett2024-10-08
Patch Tuesday - October 2024 | 5 zero-days. Configuration Manager pre-auth RCE. RDP RPC pre-auth RPC. Winlogon EoP. Hyper-V container escape. curl o-day RCE late patch. Management console zero-day RCE. Windows 11 lifecycle changes.Microsoft is addressing 118 vulnerabilities this October 2024 Patch Tuesday. Microsoft has evidence of in-the-wild exploitation and/or public disclosure for five of the vulnerabilities published today, although it does not rate any of these as
cve-2024-43583
cve-2024-43590
cve-2024-43520
cve-2024-43546
1.754
2024-10-09
1.754 | Newly Added (102)Microsoft Windows Secure Kernel Mode CVE-2024-43516 Elevation of Privilege VulnerabilityMicrosoft Windows Routing and Remote Access Service CVE-2024-38261 Remote Code Execution VulnerabilityMicrosoft .NET and Visual Studio CVE-2024-38229 Remote Code Execution Vulnerability<
cve-2024-43567
cve-2024-43520
cve-2024-43518
cve-2024-38262

Social Media

CVE-2024-43533: Critical RCE Vulnerability in Remote Desktop Client https://t.co/LqaUNk33h5
0
0
0

Affected Software

Configuration 1
TypeVendorProduct
OSMicrosoftwindows_11_21h2
OSMicrosoftwindows_server_2022
OSMicrosoftwindows_11_22h2
OSMicrosoftwindows_11_23h2
OSMicrosoftwindows_server_2022_23h2

References

ReferenceLink
[email protected]https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43533
REMOTE DESKTOP CLIENT REMOTE CODE EXECUTION VULNERABILITYhttps://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43533

CWE Details

CWE IDCWE NameDescription
CWE-416Use After FreeReferencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.

CVE Radar

Real-time CVE Intelligence & Vulnerability Management Platform

CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.

Get Free Vulnerability Intelligence AccessAccess real-time CVE monitoring, exploit analysis, and threat intelligence