First published: Tue Nov 12 2024(Updated: )
SQL Server Native Client Remote Code Execution Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft SQL Server 2017 | ||
Microsoft SQL Server 2016 Azure Connect Feature Pack | ||
Microsoft SQL Server 2019 | ||
Microsoft SQL Server | ||
Microsoft SQL Server LocalDB 2016 | ||
Microsoft VSS Writer for SQL Server 2019 | ||
Microsoft SQL Server LocalDB 2016 | >=13.0.6300.2<13.0.6455.2 | |
Microsoft SQL Server LocalDB 2016 | >=13.0.7000.253<13.0.7050.2 | |
Microsoft SQL Server | >=14.0.1000.169<14.0.2070.1 | |
Microsoft SQL Server | >=14.0.3006.16<14.0.3485.1 | |
Microsoft VSS Writer for SQL Server 2019 | >=15.0.2000.5<15.0.2130.3 | |
Microsoft VSS Writer for SQL Server 2019 | >=15.0.4003.23<15.0.4410.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49010 has been rated as critical due to its potential for remote code execution in affected Microsoft SQL Server products.
To mitigate CVE-2024-49010, users should apply the latest security updates and patches provided by Microsoft for their respective SQL Server versions.
CVE-2024-49010 impacts Microsoft SQL Server 2016, 2017, and 2019, specifically certain builds and update levels of each version.
Failure to address CVE-2024-49010 can lead to unauthorized code execution on vulnerable systems, potentially compromising sensitive data.
Currently, Microsoft recommends updating to the latest security releases as the best method for addressing CVE-2024-49010, as no specific workaround is provided.