Zero-Day Exploit Code Released for Windows Task Scheduler Flaw (CVE-2024-49039), Actively Exploited by RomCom Group

Share:

A proof-of-concept (PoC) exploit code for CVE-2024-49039, a zero-day vulnerability in Windows Task Scheduler, has been publicly released, raising concerns about increased attacks. This vulnerability, with a CVSS score of 8.8, allows attackers to escalate privileges and execute code at a higher integrity level.

Vulnerability Details:

CVE-2024-49039 enables attackers to bypass security restrictions and execute arbitrary code with elevated privileges. This flaw resides in the Windows Task Scheduler service, a critical component responsible for scheduling and automating tasks. By exploiting this vulnerability, attackers can gain a foothold in the system and potentially take complete control.

Exploitation in the Wild:

The RomCom cybercrime group, known for its sophisticated attacks, has been observed actively exploiting this zero-day vulnerability in recent campaigns targeting Firefox and Tor Browser users across Europe and North America. These attacks involve chaining CVE-2024-49039 with another zero-day (CVE-2024-9680) in Firefox to achieve code execution outside the browser’s sandbox.

Technical Analysis:

The vulnerability likely stems from a flaw in the WPTaskScheduler.dll component, which is integral to Task Scheduler since Windows 10 version 1507. Analysis suggests that this vulnerability allows attackers to bypass security measures like Restricted Token Sandbox and child-process restrictions, effectively elevating their privileges to a Medium Integrity level.

PoC Availability and Impact:

The release of PoC code on Github further amplifies the risk, as it provides malicious actors with a readily available tool to exploit CVE-2024-49039. This situation necessitates immediate action from users and organizations to mitigate potential threats.

Mitigation:

Microsoft addressed this vulnerability with a security update released on November 12th. Users are strongly urged to apply this update as soon as possible to protect their systems. Additionally, maintaining updated software and exercising caution when opening suspicious emails or clicking on unknown links can help prevent falling victim to such attacks.

do son

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
2:23 am, Jun 10, 2025
weather icon 14°C
L: 14° | H: 15°
broken clouds
Humidity: 79 %
Pressure: 1016 mb
Wind: 15 mph WSW
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 75%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:43 am
Sunset: 9:16 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
14° | 15°°C 0.31 mm 31% 11 mph 84 % 1021 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
13° | 24°°C 0 mm 0% 11 mph 91 % 1021 mb 0 mm/h
Thu Jun 12 10:00 pm
weather icon
14° | 25°°C 0 mm 0% 11 mph 75 % 1017 mb 0 mm/h
Fri Jun 13 10:00 pm
weather icon
16° | 28°°C 1 mm 100% 12 mph 93 % 1020 mb 0 mm/h
Sat Jun 14 10:00 pm
weather icon
18° | 27°°C 1 mm 100% 8 mph 96 % 1019 mb 0 mm/h
Today 4:00 am
weather icon
14° | 14°°C 0 mm 0% 11 mph 80 % 1017 mb 0 mm/h
Today 7:00 am
weather icon
15° | 15°°C 0 mm 0% 10 mph 83 % 1016 mb 0 mm/h
Today 10:00 am
weather icon
17° | 17°°C 0 mm 0% 10 mph 84 % 1017 mb 0 mm/h
Today 1:00 pm
weather icon
20° | 20°°C 0.31 mm 31% 9 mph 66 % 1017 mb 0 mm/h
Today 4:00 pm
weather icon
21° | 21°°C 0.21 mm 21% 10 mph 54 % 1018 mb 0 mm/h
Today 7:00 pm
weather icon
20° | 20°°C 0 mm 0% 4 mph 52 % 1019 mb 0 mm/h
Today 10:00 pm
weather icon
16° | 16°°C 0 mm 0% 4 mph 65 % 1021 mb 0 mm/h
Tomorrow 1:00 am
weather icon
14° | 14°°C 0 mm 0% 4 mph 77 % 1021 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€96,169.37
3.94%
Ethereum(ETH)
€2,367.62
8.08%
Tether(USDT)
€0.88
-0.01%
XRP(XRP)
€2.02
2.48%
Solana(SOL)
€140.58
5.55%
USDC(USDC)
€0.88
0.00%
Dogecoin(DOGE)
€0.170474
6.20%
Shiba Inu(SHIB)
€0.000011
4.75%
Pepe(PEPE)
€0.000011
9.19%
Peanut the Squirrel(PNUT)
€0.255909
11.96%
Scroll to Top