Microsoft has disclosed a critical vulnerability in its Lightweight Directory Access Protocol (LDAP) service, tracked as CVE-2024-49112. This flaw, which was part of the company’s December Patch Tuesday updates, presents a severe risk to enterprise networks by allowing unauthenticated attackers to execute arbitrary code within the context of the LDAP service. With a CVSS score of 9.8, the vulnerability is classified as critical, underlining the potential damage it could cause to affected systems. LDAP, a crucial protocol used for authentication and directory services, is often targeted by attackers looking to compromise corporate networks, making this vulnerability especially dangerous. Identified by security researcher Yuki Chen, the flaw impacts a wide array of Windows operating systems, including both current versions like Windows 10 and Windows 11, as well as various editions of Windows Server, covering both older and newer releases. The vulnerability is triggered by sending specially crafted LDAP requests to the server, potentially allowing attackers to compromise critical network components such as Domain Controllers. This opens the door for attackers to exploit the flaw and gain unauthorized access to enterprise networks. The risk is further amplified by the presence of two other vulnerabilities disclosed on December 11, CVE-2024-49124 and CVE-2024-49127, which have CVSS scores of 8.1. When exploited together with CVE-2024-49112, these flaws could enable attackers to escalate privileges and gain SYSTEM-level access, intensifying the overall threat. While no public exploits have been observed yet, security experts anticipate that the ease of exploitation and the severity of the vulnerabilities will likely lead to active exploitation in the near future. To mitigate the risks associated with CVE-2024-49112, Microsoft strongly recommends that organizations apply the patches released in the December Patch Tuesday updates without delay.
Cybersecurity researchers have uncovered four critical vulnerabilities in OpenClaw that can be chained together to enable data theft, privilege escalation, and long-term persistenc...
OpenAI confirmed that two employee devices were compromised as part of a broader supply chain attack involving malicious packages distributed through the TanStack JavaScript ecosys...
Gunra Ransomware has emerged as a significant cyber threat targeting Windows-based enterprise environments across multiple industries, including manufacturing, pharmaceuticals, and...