Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38073: CWE-125: Out-of-bounds Read in Microsoft Windows Server 2019

0
High
VulnerabilityCVE-2024-38073cvecve-2024-38073cwe-125
Published: Tue Jul 09 2024 (07/09/2024, 17:03:19 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Windows Remote Desktop Licensing Service Denial of Service Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/11/2026, 10:42:03 UTC

Technical Analysis

CVE-2024-38073 is an out-of-bounds read vulnerability classified under CWE-125 affecting the Windows Remote Desktop Licensing Service component in Microsoft Windows Server 2019, specifically version 10.0.17763.0. This vulnerability allows an unauthenticated attacker to send specially crafted network packets to the licensing service, triggering an out-of-bounds read condition that leads to a denial of service by crashing the service or potentially the entire server. The vulnerability does not impact confidentiality or integrity but severely affects availability. The CVSS v3.1 base score is 7.5, reflecting a high severity due to network attack vector (AV:N), no privileges required (PR:N), no user interaction (UI:N), and a direct impact on availability (A:H). The vulnerability was reserved in June 2024 and published in July 2024, with no known exploits in the wild at the time of reporting. The lack of a patch link indicates that remediation may still be pending or in progress. The Remote Desktop Licensing Service is critical for managing client access licenses for Remote Desktop Services, so disruption can prevent legitimate remote connections, impacting operational continuity. The vulnerability's exploitation is straightforward due to low complexity and no authentication requirements, increasing the risk of DoS attacks targeting exposed servers.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the availability of Remote Desktop Services, which are widely used for remote administration, teleworking, and access to critical systems. A successful denial of service attack could disrupt business operations, delay incident response, and reduce productivity, especially in sectors relying heavily on remote access such as finance, healthcare, government, and critical infrastructure. The inability to connect remotely may also hinder cybersecurity teams' ability to manage and remediate other security incidents. Given the network-exposed nature of the licensing service, attackers could launch DoS attacks from remote locations without needing credentials or user interaction, increasing the attack surface. Organizations with Windows Server 2019 deployments that have not yet applied mitigations or patches are particularly vulnerable. The impact is primarily operational, but prolonged outages could lead to financial losses and reputational damage.

Mitigation Recommendations

1. Monitor Microsoft security advisories closely and apply patches or updates as soon as they become available for Windows Server 2019, specifically addressing CVE-2024-38073. 2. Until patches are released, restrict network access to the Remote Desktop Licensing Service by implementing firewall rules or network segmentation to limit exposure only to trusted management networks. 3. Employ intrusion detection and prevention systems (IDS/IPS) to detect anomalous or malformed traffic targeting the licensing service. 4. Regularly audit and monitor Remote Desktop Services logs for unusual connection attempts or service crashes. 5. Consider deploying redundant Remote Desktop Licensing servers to reduce single points of failure and improve resilience against DoS attacks. 6. Educate IT staff about the vulnerability and establish incident response procedures to quickly address service disruptions. 7. Disable or limit the Remote Desktop Licensing Service if not required in certain environments to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-06-11T22:36:08.181Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981ec4522896dcbdb912

Added to database: 5/21/2025, 9:08:46 AM

Last enriched: 2/11/2026, 10:42:03 AM

Last updated: 3/25/2026, 12:01:23 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses