CVE-2024-1243

Improper input validation in the Wazuh agent for Windows prior to version 4.8.0 allows an attacker with control over the Wazuh server or agent key to configure the agent to connect to a malicious UNC path. This results in the leakage of the machine account NetNTLMv2 hash, which can be relayed for remote code execution or used to escalate privileges to SYSTEM via AD CS certificate forging and other similar attacks.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*

History

01 Oct 2025, 15:01

Type Values Removed Values Added
First Time Wazuh
Wazuh wazuh
References () https://github.com/wazuh/wazuh/security/advisories/GHSA-3crh-39qv-fxj7 - () https://github.com/wazuh/wazuh/security/advisories/GHSA-3crh-39qv-fxj7 - Exploit, Vendor Advisory
References () https://pentraze.com/ - () https://pentraze.com/ - Product
References () https://pentraze.com/vulnerability-reports/CVE-2024-1243/ - () https://pentraze.com/vulnerability-reports/CVE-2024-1243/ - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CWE NVD-CWE-noinfo
CPE cpe:2.3:a:wazuh:wazuh:*:*:*:*:*:*:*:*

12 Jun 2025, 16:06

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-11 02:15

Updated : 2025-10-01 15:01


NVD link : CVE-2024-1243

Mitre link : CVE-2024-1243

CVE.ORG link : CVE-2024-1243


JSON object : View

Products Affected

wazuh

  • wazuh
CWE
CWE-20

Improper Input Validation

CWE-73

External Control of File Name or Path

NVD-CWE-noinfo