CVE-2023-21554

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems running Microsoft Message Queuing (MSMQ) by sending specially crafted packets. It affects Windows servers and workstations with MSMQ enabled, particularly those exposed to untrusted networks. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Microsoft Windows Server
  • Microsoft Windows
Versions: Windows Server 2022, 2019, 2016, 2012 R2, 2012; Windows 11, 10
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if MSMQ service is installed and running. Not installed by default on most Windows versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM/Administrator privileges, enabling data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to initial foothold, credential harvesting, and lateral movement within the network.

🟢

If Mitigated

Attack blocked at network perimeter or by disabled MSMQ service, limiting impact to denial of service attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply January 2023 security updates or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554

Restart Required: Yes

Instructions:

1. Install January 2023 security updates from Windows Update. 2. For Server Core installations, use: wusa.exe Windows10.0-KB5022282-x64.msu /quiet /norestart. 3. Restart system after installation.

🔧 Temporary Workarounds

Disable MSMQ Service

windows

Stop and disable the Microsoft Message Queuing service if not required

sc stop MSMQ
sc config MSMQ start= disabled

Block MSMQ Ports

windows

Block TCP port 1801 and UDP port 3527 at network perimeter

netsh advfirewall firewall add rule name="Block MSMQ" dir=in action=block protocol=TCP localport=1801
netsh advfirewall firewall add rule name="Block MSMQ UDP" dir=in action=block protocol=UDP localport=3527

🧯 If You Can't Patch

  • Disable MSMQ service on all affected systems immediately
  • Implement strict network segmentation and firewall rules to block MSMQ traffic (TCP 1801, UDP 3527) from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if MSMQ service is installed and running: sc query MSMQ | findstr STATE

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify January 2023 security updates are installed: wmic qfe list | findstr "5022282"

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with MSMQ process creation
  • Windows Security logs showing unexpected service starts
  • Application logs with MSMQ errors

Network Indicators:

  • Unusual traffic to TCP port 1801 or UDP port 3527
  • MSMQ protocol anomalies in network traffic

SIEM Query:

source="windows" (event_id=4688 AND process_name="*msmq*") OR (destination_port=1801 OR destination_port=3527) AND protocol="TCP"

🔗 References

📤 Share & Export