Protect Yourself from a Microsoft SQL Server Vulnerability

CVSScvssV3_1: 8.8

Microsoft SQL Server is a popular database management system used by many organizations worldwide. Unfortunately, researchers recently discovered a remote code execution vulnerability in one of its components called WDAC OLE DB provider.

The vulnerability has been assigned the identifier CVE-2024-21368 and has a CVSS score of 8.8, making it a serious risk. Attackers can exploit this vulnerability remotely without any authentication required.

WDAC OLE DB provider is a data access component that allows applications to connect and interact with SQL Server databases. By sending specially crafted requests, attackers can execute arbitrary code on SQL Server systems with the privileges of the WDAC OLE DB provider process. This gives them complete control of affected systems.

To carry out attacks, all an attacker needs is to be able to communicate with the targeted SQL Server system, whether over the internet or a local network. They can then exploit the vulnerability to install web shells, ransomware or other malware without the user’s knowledge.

The best way for SQL Server administrators to protect their systems is to apply the security patch released by Microsoft to fix this vulnerability. Regularly updating your systems with the latest patches is critical to close vulnerabilities like this. You should also monitor your networks for any unusual activity and scan systems regularly for any unauthorized changes. Taking basic security precautions can go a long way in keeping attackers at bay.