CISA Warns of Critical Microsoft SCCM Vulnerability Exploited in Real-World Attacks
Critical Microsoft SCCM Vulnerability Actively Exploited in Attacks
A critical vulnerability in Microsoft Configuration Manager (SCCM) is being actively exploited by attackers, prompting the US Cybersecurity and Infrastructure Security Agency (CISA) to order federal agencies to patch their systems. The flaw, tracked as CVE-2024-43468, allows remote attackers to execute arbitrary code with elevated privileges on vulnerable servers and databases.
Microsoft Configuration Manager Vulnerability
Microsoft Configuration Manager is a widely used IT administration tool for managing large groups of Windows servers and workstations. The SQL injection vulnerability was first reported by Synacktiv, an offensive security company, and was patched by Microsoft in October 2024. However, at the time, Microsoft considered exploitation to be “less likely” due to the complexity of crafting the attack.
Proof-of-Concept Exploitation Code
Despite this, Synacktiv released proof-of-concept exploitation code in November 2024, demonstrating the feasibility of the attack. CISA has now flagged CVE-2024-43468 as actively exploited in the wild, posing significant risks to the federal enterprise.
CISA Warning and Guidance
The agency has ordered Federal Civilian Executive Branch (FCEB) agencies to patch their systems by March 5th, as mandated by the Binding Operational Directive (BOD) 22-01.
Recommendations for Network Defenders
While BOD 22-01 applies only to federal agencies, CISA is encouraging all network defenders, including those in the private sector, to secure their devices against ongoing CVE-2024-43468 attacks as soon as possible. This includes applying mitigations per vendor instructions, following applicable BOD 22-01 guidance for cloud services, or discontinuing use of the product if mitigations are unavailable.
Importance of Timely Patching
The exploitation of CVE-2024-43468 highlights the importance of timely patching and vulnerability management. Organizations are advised to prioritize the patching of this critical vulnerability to prevent potential attacks and protect their IT infrastructure.
