First published: Tue Nov 12 2024(Updated: )
SQL Server Native Client Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server 2019 | ||
Microsoft SQL Server | ||
Microsoft SQL Server LocalDB 2016 | ||
Microsoft VSS Writer for SQL Server 2019 | ||
Microsoft SQL Server LocalDB 2016 | >=13.0.6300.2<13.0.6455.2 | |
Microsoft SQL Server LocalDB 2016 | >=13.0.7000.253<13.0.7050.2 | |
Microsoft SQL Server | >=14.0.1000.169<14.0.2070.1 | |
Microsoft SQL Server | >=14.0.3006.16<14.0.3485.1 | |
Microsoft VSS Writer for SQL Server 2019 | >=15.0.2000.5<15.0.2130.3 | |
Microsoft VSS Writer for SQL Server 2019 | >=15.0.4003.23<15.0.4410.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-48996 is classified as a remote code execution vulnerability, indicating a significant risk level due to potential exploitation.
To mitigate CVE-2024-48996, apply the relevant security patches available for your version of SQL Server as provided by Microsoft.
CVE-2024-48996 affects multiple versions of SQL Server, including SQL Server 2016, SQL Server 2017, and SQL Server 2019.
Yes, exploitation of CVE-2024-48996 can potentially allow an attacker to execute arbitrary code and compromise sensitive data.
While applying patches is the recommended action, any temporary workaround would depend on the specific system configuration and is less secure.