Patch
CVE-2024-49112
with vRx
Vulnerability Overview
CVE Name
CVE-2024-49112
Severity
9.8
Critical
CVE Description
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
Show more
Show less
Latest Patch info
Patch Name
Date
Script

Script Type
Detection script
Researchers have kicked off 2025 with the release of a zero-click PoC exploit for CVE-2024-49112, dubbed “LDAP Nightmare”. This critical Windows vulnerability has a CVSS score of 9.8, threatening enterprise networks, including Active Directory Domain Controllers.
Key Details:
▫️Type: Remote Code Execution (RCE)
▫️Impact: Crashes unpatched Windows Servers, including Active Directory DCs.
▫️ Exploitation Path: Requires no authentication, only Internet connectivity for DNS.
▫️Affected Systems: All unpatched versions of Windows Server (2019–2022).
Exploitation Highlights:
▫️ Exploit triggers an LSASS (Local Security Authority Subsystem Service) crash via malicious LDAP queries.
▫️ Attack flow involves DNS SRV queries, manipulated NetBIOS/CLDAP responses, and crafted LDAP referral responses.
Read more
Read less
Affected OS & Apps
Windows Server 2025
by
Microsoft
Windows 11 24H2
by
Microsoft
Windows Server 2022 23H2
by
Microsoft
Show more
Patch faster and smarter
with vRx
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Trusted by 600+ customers:




Solution
Patch faster and better with vRx
Patch Management
vRx automatically deploys patches across all systems, cutting patching time by 80%.
Scripting Engine
vRx’s scripting engine solves complex vulnerabilities, like log4j, with built-in or custom scripts.
Patchless Protection
vRx’s Patchless Protection secures vulnerable apps and reduces risk while maintaining functionality.

Automated Patching, Scripting, and more
Talk with our team to get a personal walkthrough
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.