PatchSiren

PatchSiren cyber security CVE debrief

CVE-2024-43455 Microsoft CVE debrief

CVE-2024-43455 is a Microsoft Windows Remote Desktop Licensing Service spoofing vulnerability disclosed on 2024-09-10 and rated 8.8 (High). NVD lists affected Windows Server releases from 2008 SP2 through 2022 23H2, with fixed build thresholds for newer releases. Because the CVSS vector is network-reachable, requires only low privileges, and needs no user interaction, administrators should treat it as a high-priority patch item.

Vendor
Microsoft
Product
CVE-2024-43455
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2024-09-10
Original CVE updated
2026-05-11
Advisory published
2024-09-10
Advisory updated
2026-05-11

Who should care

Windows Server administrators, Remote Desktop Services operators, and teams responsible for patching server estates that may include Windows Server 2008 SP2 through 2022 23H2 should review this CVE and confirm exposure.

Technical summary

The supplied NVD record classifies CVE-2024-43455 as a spoofing issue in the Windows Remote Desktop Licensing Service. Microsoft’s advisory is referenced in the record, and the CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) indicates network attackability, low attacker privilege, no user interaction, and potentially severe confidentiality, integrity, and availability impact. The affected CPEs include Windows Server 2008 SP2, 2008 R2 SP1, 2012, 2012 R2, 2016 before 10.0.14393.7336, 2019 before 10.0.17763.6293, 2022 before 10.0.20348.2700, and 2022 23H2 before 10.0.25398.1128.

Defensive priority

High priority; patch promptly on affected Windows Server systems and verify installed build levels against Microsoft’s advisory.

Recommended defensive actions

  • Review the Microsoft MSRC advisory for CVE-2024-43455 and confirm whether any affected Windows Server versions are deployed.
  • Apply the Microsoft updates that remediate the affected build ranges listed by NVD and verify successful installation.
  • Prioritize systems that expose Remote Desktop-related services or are otherwise important to remote access infrastructure.
  • Use build-number and product inventory checks to identify legacy Windows Server systems that may be easy to miss.
  • Monitor for unusual Remote Desktop Licensing Service behavior until remediation is complete.

Evidence notes

This debrief is based on the supplied official records only: the NVD entry published on 2024-09-10 and last modified on 2026-05-11, plus the Microsoft MSRC advisory referenced by NVD. The record supplies the CVSS vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, a spoofing description, Microsoft as the vendor, and affected Windows Server CPE criteria. No exploit code, weaponized reproduction, or unsupported exploitation claims are included.

Official resources

Publicly disclosed on 2024-09-10; the supplied NVD record was last modified on 2026-05-11.