CVE-2023-24860
📋 TL;DR
CVE-2023-24860 is a denial-of-service vulnerability in Microsoft Defender that allows attackers to crash the antimalware service, temporarily disabling protection. This affects Windows systems running vulnerable versions of Microsoft Defender. The vulnerability requires local access to the system.
💻 Affected Systems
- Microsoft Defender Antivirus
- Microsoft Defender for Endpoint
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete disruption of Microsoft Defender protection, leaving the system vulnerable to malware and other attacks until service restart.
Likely Case
Temporary denial of service of Microsoft Defender antimalware service, requiring manual service restart to restore protection.
If Mitigated
Minimal impact with proper patching and monitoring; service automatically restarts but leaves brief protection gap.
🎯 Exploit Status
Exploit requires local access; proof-of-concept code has been published.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: March 2023 security updates (KB5023696, KB5023697, etc.)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860
Restart Required: Yes
Instructions:
1. Apply March 2023 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS, Microsoft Endpoint Configuration Manager, or Microsoft Intune. 3. Restart systems to complete installation.
🔧 Temporary Workarounds
Restrict local access
windowsLimit local user privileges and implement least privilege access controls
Monitor Defender service
windowsImplement monitoring for Microsoft Defender service crashes and automatic restart
🧯 If You Can't Patch
- Implement strict access controls to limit who has local system access
- Deploy additional endpoint protection layers and monitor for Defender service disruptions
🔍 How to Verify
Check if Vulnerable:
Check Windows Update history for March 2023 security updates; verify Microsoft Defender version is 1.381.2140.0 or later
Check Version:
Get-MpComputerStatus | Select-Object AMProductVersion
Verify Fix Applied:
Verify March 2023 security updates are installed and Microsoft Defender service is running normally
📡 Detection & Monitoring
Log Indicators:
- Event ID 1000 from MsMpEng.exe crashes in Application logs
- Unexpected Microsoft Defender service stops
Network Indicators:
- Unusual local process activity attempting to interact with Defender service
SIEM Query:
EventID=1000 AND Source="Application Error" AND ProcessName="MsMpEng.exe"