IRONSMITHINTEL
CRITICALCVSS9.8
|CVE-2024-49112|Auth: none on domain controller path; user interaction on client path|Reboot: required|Est. 60–120 minutes per DC including reboot|Manual only

Windows LDAP Integer Overflow — Pre-Auth RCE Against Domain Controllers (CVE-2024-49112)

An integer overflow in the Windows LDAP client allows a remote attacker to execute arbitrary code on a domain controller via a crafted RPC call that triggers a domain lookup. SafeBreach published a working PoC in January 2025 ("LDAPNightmare"). Apply the December 2024 cumulative update on every domain controller immediately.

Published Dec 10, 2024 · Updated May 16, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

A network attacker with no credentials can crash a domain controller with the public PoC and, by extension of the same primitive, execute arbitrary code in the LSASS context. Code execution on a domain controller is effectively complete domain compromise — the attacker can extract every credential in the domain, modify directory data, and persist indefinitely. The DC-side attack does not require any user interaction.

How the attack works

An integer overflow in the Windows LDAP client's response parser can be triggered when a domain controller (or any LDAP client) processes a crafted referral or response. On a domain controller, an attacker can drive this via an unauthenticated RPC call that causes the DC to issue an outbound LDAP query to an attacker-controlled host, which then returns the malicious response. On non-DC clients, the attacker needs to lure the client into connecting to an attacker-controlled domain. Affected: Windows 10/11 and Windows Server 2008 SP2 through Windows Server 2025 prior to the December 2024 Patch Tuesday.

Am I affected?Quick check

Probably yes if any of these apply:

Domain Controllers
Active Directory Administrators
Domain-joined Windows Servers
IT Security
Running Windows Server 2008 SP2 through Windows Server 2025, prior to the December 2024 cumulative update

Affected OS versions

Windows Server 2008 SP2Windows Server 2008 R2 SP1Windows Server 2012Windows Server 2012 R2Windows Server 2016Windows Server 2019Windows Server 2022Windows Server 2022 23H2Windows Server 2025
Fixed inDecember 2024 Patch Tuesday cumulative update (see manual_steps for per-OS KB lookup)
Real-world incidentsWhat we've seen

SafeBreach published a full proof-of-concept under the name "LDAPNightmare" in January 2025 demonstrating reliable LSASS crash on unpatched domain controllers, with a credible path to RCE. Microsoft's pre-patch defence-in-depth guidance is to (a) block domain controllers from initiating outbound internet connections and (b) restrict inbound RPC from untrusted networks — Microsoft explicitly noted these in combination provide effective mitigation. Domain controllers are the highest-value target in any Windows environment; CVE-2024-49112 is correspondingly among the most urgent patches of the December 2024 cycle.

How to patch

Manual remediation steps

60–120 minutes per DC including reboot

Inventory domain controllers

# List every DC in the forest:
Get-ADDomainController -Filter * | Select-Object HostName, OperatingSystem, OperatingSystemVersion

Defence-in-depth (apply on every DC even after patching)

# 1. Block domain controllers from initiating outbound internet connections.
#    Configure on the network firewall — DCs should never originate outbound
#    traffic to the public internet.
#
# 2. Restrict inbound RPC to the DC from untrusted networks:
New-NetFirewallRule -DisplayName "Block inbound RPC from untrusted" `
  -Direction Inbound -Action Block -Protocol TCP -LocalPort 135 `
  -RemoteAddress <untrusted-subnets>

Apply the December 2024 cumulative update

1
Open Microsoft Update Catalog: https://catalog.update.microsoft.com
2
Search for CVE-2024-49112 to find the current superseding cumulative for your OS
3
Approve via WSUS / SCCM, or download the MSU and run as Administrator
4
Restart each DC in turn (drain replication / FSMO holders first)

Verify

# Confirm the LDAP client binary is patched:
(Get-Item C:\Windows\System32\wldap32.dll).VersionInfo.FileVersion
# Server 2022 fixed in build 10.0.20348.2966 or later
# Server 2019 fixed in the corresponding December 2024 cumulative
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.