First published: Tue Dec 10 2024(Updated: )
Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2025 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | =r2 | |
Microsoft Windows Server 2016 | <10.0.14393.7606 | |
Microsoft Windows Server 2019 | <10.0.17763.6659 | |
Microsoft Windows Server 2022 | <10.0.20348.2966 | |
Microsoft Windows Server 2025 | <10.0.26100.2605 | |
Microsoft Windows Server 2022 23H2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-49129 is classified as a Denial of Service vulnerability affecting Windows Remote Desktop Gateway.
To fix CVE-2024-49129, apply the respective security patches available for your affected version of Windows Server.
CVE-2024-49129 affects Windows Server 2012, 2012 R2, 2016, 2019, 2022, and 2025.
The impact of CVE-2024-49129 is a potential Denial of Service that could disrupt Remote Desktop Gateway services.
You can verify your system's vulnerability by checking if it is running an affected version of Windows Server and if the necessary updates have been applied.