Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43454: CWE-23: Relative Path Traversal in Microsoft Windows Server 2019

0
High
VulnerabilityCVE-2024-43454cvecve-2024-43454cwe-23
Published: Tue Sep 10 2024 (09/10/2024, 16:54:11 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows Server 2019

Description

Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:46:24 UTC

Technical Analysis

CVE-2024-43454 is a relative path traversal vulnerability (CWE-23) identified in the Windows Remote Desktop Licensing Service component of Microsoft Windows Server 2019 (build 10.0.17763.0). This vulnerability arises from improper validation of file paths, allowing an attacker with low privileges (PR:L) to manipulate file system paths to access or overwrite files outside the intended directory scope. Exploitation does not require user interaction (UI:N) and can be performed remotely over the network (AV:N) with low attack complexity (AC:L). Successful exploitation can lead to remote code execution, primarily impacting system integrity (I:H) and causing limited availability impact (A:L), while confidentiality remains unaffected (C:N). The vulnerability scope is unchanged (S:U), meaning the exploit affects only the vulnerable component without extending privileges beyond it. Although no known exploits have been reported in the wild, the vulnerability's characteristics and CVSS score of 7.1 (high severity) indicate a significant risk to affected systems. The absence of an official patch at the time of reporting necessitates immediate attention to mitigation strategies to prevent potential exploitation.

Potential Impact

The primary impact of CVE-2024-43454 is the potential for remote code execution on Windows Server 2019 systems running the Remote Desktop Licensing Service, which could allow attackers to execute arbitrary code with the privileges of the service. This compromises system integrity and could lead to partial denial of service or unauthorized system modifications. Although confidentiality is not directly affected, the ability to execute code remotely can facilitate further attacks, lateral movement, or persistence within an organization's network. Given the widespread use of Windows Server 2019 in enterprise environments, especially in sectors relying on Remote Desktop Services for licensing management, this vulnerability poses a significant risk to business continuity and operational security worldwide. The lack of required user interaction and low complexity of attack increase the likelihood of exploitation once an exploit becomes available.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Restrict network access to the Remote Desktop Licensing Service to trusted management networks only, using firewalls or network segmentation. 2) Enforce the principle of least privilege by ensuring that accounts with access to the licensing service have minimal permissions. 3) Monitor logs and network traffic for unusual file access patterns or attempts to exploit path traversal. 4) Disable or uninstall the Remote Desktop Licensing Service if it is not required in the environment. 5) Prepare for rapid deployment of the official patch once available by maintaining updated asset inventories and testing procedures. 6) Employ application whitelisting and endpoint detection and response (EDR) tools to detect and block suspicious activities related to file system manipulation or code execution attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-08-14T01:08:33.515Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cd8b7ef31ef0b5697ce

Added to database: 2/25/2026, 9:42:48 PM

Last enriched: 2/26/2026, 7:46:24 AM

Last updated: 4/12/2026, 7:58:14 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses