CVE-2023-24871

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems via the Bluetooth service without user interaction. It affects Windows 10, 11, and Server versions with Bluetooth enabled. Attackers can exploit this to gain SYSTEM privileges on vulnerable systems.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2019
  • Windows Server 2022
Versions: Multiple versions prior to March 2023 security updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Bluetooth enabled. Windows Server installations typically have Bluetooth disabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling persistent backdoors, data theft, and lateral movement across the network.

🟠

Likely Case

Initial foothold for ransomware or data exfiltration campaigns, particularly in enterprise environments with Bluetooth peripherals.

🟢

If Mitigated

Limited impact with proper network segmentation and Bluetooth restrictions, though still a critical vulnerability requiring patching.

🌐 Internet-Facing: LOW - Bluetooth typically requires proximity (within ~10 meters), though Bluetooth over IP configurations could increase risk.
🏢 Internal Only: HIGH - Internal attackers or compromised devices within Bluetooth range can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires Bluetooth proximity or network access to Bluetooth services. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: March 2023 security updates (KB5023696 for Windows 10, KB5023706 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24871

Restart Required: Yes

Instructions:

1. Apply March 2023 Windows security updates via Windows Update. 2. For enterprise: Deploy updates through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after patching.

🔧 Temporary Workarounds

Disable Bluetooth Service

windows

Disables the Bluetooth support service to prevent exploitation

sc config bthserv start= disabled
sc stop bthserv

Disable Bluetooth via Group Policy

windows

Use Group Policy to disable Bluetooth on domain-joined systems

🧯 If You Can't Patch

  • Disable Bluetooth on all vulnerable systems immediately
  • Implement network segmentation to isolate systems with Bluetooth from critical assets

🔍 How to Verify

Check if Vulnerable:

Check if March 2023 security updates are installed via 'systeminfo' or Windows Update history

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5023696 (Win10) or KB5023706 (Win11) is installed and Bluetooth service is running version 10.0.19041.2788 or later

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1000 application crashes for Bluetooth service
  • Unusual Bluetooth connection attempts in Security logs

Network Indicators:

  • Unexpected Bluetooth protocol traffic on non-standard ports
  • Bluetooth service connections from unauthorized devices

SIEM Query:

source="Windows Security" EventID=4688 NewProcessName="*\System32\svchost.exe" ProcessCommandLine="*bthserv*"

🔗 References

📤 Share & Export