IRONSMITHINTEL
CRITICALCVSS9.8
|CVE-2024-30080|Auth: none — unauthenticated|Reboot: required|Est. 30–60 minutes including reboot|Manual only

MSMQ Use-After-Free — Pre-Auth Remote Code Execution Over Port 1801 (CVE-2024-30080)

A use-after-free in the Microsoft Message Queuing service allows an unauthenticated network attacker to execute arbitrary code by sending crafted MSMQ packets to TCP/1801. Apply the June 2024 cumulative update or remove the MSMQ feature where it is not actively used.

Published Jun 11, 2024 · Updated May 16, 2026
Why patchRisk explained in plain English
Worst-case scenarioIf unpatched

A network-positioned attacker who can reach TCP/1801 on an MSMQ-enabled server can execute arbitrary code as the service account (typically NETWORK SERVICE, with full Local System on some legacy roles). Many organisations leave MSMQ exposed on internal segments after the application that originally required it was retired, leaving a trivially exploitable path for lateral movement.

How the attack works

The MSMQ service handles incoming queue messages with a use-after-free bug that an attacker can trigger remotely. The service listens on TCP/1801 and is installed whenever the "Message Queuing" Windows feature is enabled — commonly added by legacy line-of-business apps, SQL Server Service Broker deployments, BizTalk, and many internal-facing automation systems. The Microsoft advisory rates exploitation "More Likely". Affected: Windows Server 2008 SP2 through Windows Server 2022, including Server Core installations, prior to the June 2024 Patch Tuesday.

Am I affected?Quick check

Probably yes if any of these apply:

BizTalk Servers
SQL Server Service Broker Hosts
Legacy Line-of-Business Backends
Any server with the Message Queuing feature installed
Running Windows Server 2008 SP2 through Windows Server 2022 23H2 with the Message Queuing feature installed, prior to the June 2024 cumulative update

Affected OS versions

Windows Server 2008 SP2Windows Server 2008 R2 SP1Windows Server 2012Windows Server 2012 R2Windows Server 2016Windows Server 2019Windows Server 2022Windows Server 2022 23H2
Fixed inJune 2024 Patch Tuesday cumulative update (see manual_steps for per-OS KB lookup)
Real-world incidentsWhat we've seen

CVE-2024-30080 is the sequel to 2023's "QueueJumper" (CVE-2023-21554), which also targeted MSMQ. Within weeks of the June 2024 disclosure, multiple researchers published technical write-ups walking through the use-after-free chain; PoC code circulated on GitHub. Shodan and Censys both report tens of thousands of MSMQ endpoints exposed to the public internet at any given time, and the service is enormously over-deployed inside enterprise networks relative to the small number of applications that genuinely need it.

How to patch

Manual remediation steps

30–60 minutes including reboot

Detect MSMQ exposure

# Check whether the Message Queuing feature is installed AND running:
Get-WindowsOptionalFeature -Online -FeatureName MSMQ-Server
Get-Service -Name MSMQ -ErrorAction SilentlyContinue

# Check whether TCP/1801 is reachable from where it should not be:
Test-NetConnection -ComputerName <server> -Port 1801

Preferred mitigation — uninstall MSMQ if not actively used

# Uninstall the Message Queuing feature entirely:
Disable-WindowsOptionalFeature -Online -FeatureName MSMQ-Server -NoRestart
Disable-WindowsOptionalFeature -Online -FeatureName MSMQ -NoRestart
Restart-Computer

Temporary network mitigation

# Block inbound TCP/1801 at the host firewall except from known queue clients:
New-NetFirewallRule -DisplayName "Block inbound MSMQ except trusted" `
  -Direction Inbound -Action Block -Protocol TCP -LocalPort 1801

Apply the June 2024 cumulative update

1
Open Microsoft Update Catalog: https://catalog.update.microsoft.com
2
Search for CVE-2024-30080 to find the current superseding cumulative for your OS
3
Approve via WSUS / SCCM, or download the MSU and run as Administrator
4
Restart the server

Verify

# Confirm the build number is at or above the June 2024 patch level for your OS,
# then confirm the patched MSMQ binary is loaded:
Get-Item C:\Windows\System32\mqqm.dll | Select-Object VersionInfo
PowerShell automationComing soon

No tested PowerShell script for this entry yet. We’re prioritising automation based on user demand.