CVE-2024-49105 Overview
CVE-2024-49105 is a Remote Code Execution (RCE) vulnerability affecting Microsoft Remote Desktop Client and Windows App across a wide range of Windows operating systems. This vulnerability allows an attacker with high privileges to execute arbitrary code on a victim's system when the user interacts with a malicious Remote Desktop connection, potentially leading to complete system compromise.
Critical Impact
Successful exploitation enables attackers to execute arbitrary code with the ability to impact confidentiality, integrity, and availability beyond the vulnerable component's security scope. The network-based attack vector combined with user interaction requirements makes this a significant threat in enterprise environments utilizing Remote Desktop services.
Affected Products
- Microsoft Remote Desktop Client for Windows
- Microsoft Windows App
- Windows 10 versions 1507, 1607, 1809, 21H2, 22H2 (x86 and x64)
- Windows 11 versions 22H2, 23H2, 24H2
- Windows Server 2008 R2 SP1, 2012, 2012 R2, 2016, 2019, 2022, 2022 23H2, 2025
Discovery Timeline
- December 12, 2024 - CVE-2024-49105 published to NVD
- July 7, 2025 - Last updated in NVD database
Technical Details for CVE-2024-49105
Vulnerability Analysis
This Remote Code Execution vulnerability resides in the Microsoft Remote Desktop Client component. The vulnerability is categorized under CWE-284 (Improper Access Control), indicating that the flaw stems from insufficient access control mechanisms within the Remote Desktop Client's processing logic.
The attack requires a network-accessible vector where an attacker with elevated privileges can craft malicious Remote Desktop Protocol (RDP) content that, when processed by a victim's Remote Desktop Client, results in arbitrary code execution. The scope change indicator in the vulnerability assessment suggests that successful exploitation can affect resources beyond the vulnerable component itself, potentially compromising the entire system or adjacent network resources.
Root Cause
The vulnerability originates from improper access control (CWE-284) within the Remote Desktop Client's handling of RDP session data. Insufficient validation or enforcement of access boundaries allows an attacker to bypass security controls and execute code in the context of the client application. This type of flaw typically occurs when the client fails to properly validate server-supplied data or when privilege boundaries are not correctly enforced during RDP session establishment and communication.
Attack Vector
The exploitation scenario involves a network-based attack where:
- An attacker with elevated privileges establishes or controls a malicious RDP server
- A victim user initiates an RDP connection to the malicious server using a vulnerable Remote Desktop Client
- The malicious server sends specially crafted RDP protocol data to the client
- Due to improper access control, the client processes this data without adequate security checks
- This results in arbitrary code execution on the victim's machine, with potential scope change affecting additional system resources
The vulnerability requires user interaction, meaning the victim must actively initiate an RDP connection to the attacker-controlled server. Organizations should be particularly vigilant about scenarios where users may connect to untrusted or unknown RDP endpoints.
Detection Methods for CVE-2024-49105
Indicators of Compromise
- Unusual Remote Desktop Client (mstsc.exe) process behavior, including unexpected child processes or network connections
- Anomalous outbound RDP connections to unrecognized or unauthorized IP addresses
- Suspicious memory allocation patterns or crash dumps from Remote Desktop Client processes
- Unexpected system changes or file modifications following RDP sessions to external endpoints
Detection Strategies
- Monitor for Remote Desktop Client processes spawning unexpected child processes or executing shell commands
- Implement network monitoring to detect RDP connections to unauthorized or suspicious external hosts
- Deploy endpoint detection rules to identify abnormal Remote Desktop Client behavior patterns
- Review Windows Event Logs for unusual RDP connection events and authentication anomalies
Monitoring Recommendations
- Enable enhanced RDP session logging through Group Policy to capture detailed connection metadata
- Configure SIEM rules to alert on Remote Desktop Client connections to non-whitelisted destinations
- Monitor for unusual process creation chains originating from mstsc.exe or Windows App processes
- Implement network segmentation monitoring to detect lateral movement following potential RDP exploitation
How to Mitigate CVE-2024-49105
Immediate Actions Required
- Apply the latest Microsoft security updates for all affected Windows systems and Remote Desktop Client versions
- Restrict RDP connections to trusted, authorized servers only through firewall rules and Group Policy
- Enable Network Level Authentication (NLA) for all RDP connections to add an additional authentication layer
- Review and audit all external RDP connections within your environment
Patch Information
Microsoft has released security updates to address this vulnerability. Organizations should apply the patches available through Microsoft Security Update Guide for CVE-2024-49105 immediately.
Updates should be applied to:
- Microsoft Remote Desktop Client installations
- Microsoft Windows App
- All affected Windows 10 and Windows 11 versions
- All affected Windows Server versions (2008 R2 SP1 through 2025)
Workarounds
- Implement application whitelisting to control which RDP servers users can connect to
- Use VPN or jump servers to intermediate all external RDP connections through controlled, monitored endpoints
- Disable Remote Desktop Client for users who do not require remote access functionality
- Deploy host-based firewall rules to block outbound RDP connections except to explicitly authorized destinations
# Configuration example - Restrict RDP connections via Windows Firewall
# Block outbound RDP connections to all destinations
netsh advfirewall firewall add rule name="Block Outbound RDP" dir=out action=block protocol=TCP remoteport=3389
# Allow outbound RDP only to specific trusted hosts
netsh advfirewall firewall add rule name="Allow RDP to Trusted Server" dir=out action=allow protocol=TCP remoteport=3389 remoteip=10.0.0.100
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


