A critical remote code execution vulnerability, identified as CVE-2024-49112, has been discovered in Windows LDAP. A proof of concept (PoC) exploit has now been released, demonstrating how an attacker can exploit unpatched Domain Controllers. The vulnerability is triggered by a malicious LDAP request which causes memory corruption and allows for remote code execution, without any user interaction making it a zero click exploit. The exploit leverages a flaw within the wldap32.dll library, a core component of the LDAP client.
SafeBreach Labs researchers have developed this PoC which causes unpatched Windows Servers to crash. The attack involves the victim server sending a DNS query to a domain controlled by the attacker. The attacker's DNS server responds, directing the victim to send an LDAP request to the attacker's machine. By manipulating the length field of a specific value within a crafted LDAP response packet, a null pointer dereference is triggered leading to a crash and potentially allowing remote code execution. This vulnerability poses a significant threat, especially to Active Directory Domain Controllers, which are critical for network security.