MadLicense CVE-2024-38077 RCE Threatens All Windows Servers

MadLicense CVE-2024-38077 RCE Threatens All Windows Servers

2 Minutes Read Updated on May 21, 2025

MadLicense CVE-2024-38077 RCE Vulnerability

The latest CVE-2024-38077 Remote Code Execution vulnerability (RCE) and coined MadLicense has been rated as absolutely critical with a CVSS 3.1 score of 9.8.

The Windows Remote Desktop Licensing (RDL) service has a vulnerability that enables network attacks with low complexity, affecting all versions of Windows Server from 2000 to 2025 (all Windows Servers). According to Microsoft, an unauthenticated attacker could exploit this flaw by connecting to the Remote Desktop Licensing service and sending a malicious message, potentially leading to remote code execution without the need for authentication.

Proof-of-Concept (PoC) Exploit Code

Researchers on Github have demonstrated a proof-of-concept (POC) exploit on Windows Server 2025, achieving an almost 100% success rate. The exploit successfully bypasses all current mitigations, but it could be significantly faster and more reliable with a deeper understanding and more refined techniques for controlling memory layout.

Understanding Remote Desktop Licensing

This policy setting Remote Desktop licensing mode allows you to specify the type of Remote Desktop Services client access license (RDS CAL) that is required to connect to this RD Session Host server. This policy setting can be used to select one of two licensing modes: Per User or Per Device.

  • Per User licensing mode requires that each user account connecting to this RD Session Host server have an RDS Per User CAL.
  • Per Device licensing mode requires that each device connecting to this RD Session Host server have an RDS Per Device CAL.

If this policy setting was enabled, the licensing mode that was specified takes precedence over the licensing mode that is specified during the installation of Remote Desktop Session Host or specified in the Remote Desktop Session Host Configuration tool.

If this policy was disabled or not configured, the licensing mode that is specified during the installation of Remote Desktop Session Host role service or specified in the Remote Desktop Session Host Configuration tool is used.

The recommended setting is: Disable Remote Desktop Licensing Service if is not required.

RDP Hardening and Hardening RDS Essential Guide

Mitigating MadLicense CVE-2024-38077

For CVE-2024-38077 RCE vulnerability to be exploited, the Windows Remote Desktop Licensing (RDL) service must be turned on or running on the target system. If this service is not enabled, the attacker cannot carry out the exploit, even if no special privileges are required.

At the core of CalCom’s Hardening Suite (CHS) is its ability to disable or enable security settings with granular precision across an entire IT environment. By selectively activating or deactivating specific controls, businesses can optimize their security posture without compromising essential operations.

In addition to its automation capabilities, CHS also offers reporting and monitoring features, allowing organizations to track compliance and quickly identify areas that require attention. Hear more about CHS.

Ben Balkin
Ben Balkin is a professional writer and blogger specializing in technology and innovation. As a contributor to the Calcom blog, Ben shares practical insights, useful tips, and engaging articles designed to simplify complex processes and make advanced technological solutions accessible to everyone. His writing style is clear, insightful, and inspiring, reflecting his strong belief in technology's power to enhance quality of life and empower businesses.

Related Articles

CIS Hardening and Configuration Security Guide

CIS Hardening and Configuration Security Guide

February 14, 2024

The Center for Internet Security (CIS) published an updated version for the CIS Controls- CIS…

IIS: Ensure ‘deployment method retail’ is set

IIS: Ensure ‘deployment method retail’ is set

August 6, 2020

This configuration is important both for the performance and the security of the production environment.…

Ensure ‘Store passwords using reversible encryption’ is set to ‘Disabled’

Ensure ‘Store passwords using reversible encryption’ is set to ‘Disabled’

December 15, 2021

Password storage and encryption are an essential part of your password policy. Reversible encryption is…

Ready to simplify compliance?

See automated compliance in action—book your demo today!

Share this article