CVE-2023-24943

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Windows systems by sending specially crafted PGM (Pragmatic General Multicast) protocol packets. It affects Windows systems with the Windows Message Queuing service enabled and configured to use PGM. Attackers can exploit this without authentication to gain SYSTEM-level privileges.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows Server 2008 through 2022, Windows 10 through 11
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if Windows Message Queuing service is installed and configured to use PGM protocol. Not enabled by default on most systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, lateral movement, and persistent backdoors across the network.

🟠

Likely Case

Remote code execution leading to ransomware deployment, credential harvesting, or botnet recruitment of vulnerable systems.

🟢

If Mitigated

Limited impact if Message Queuing service is disabled or PGM is not configured, with network segmentation preventing exploitation.

🌐 Internet-Facing: HIGH if Message Queuing service with PGM is exposed to the internet, as exploitation requires no authentication.
🏢 Internal Only: HIGH for internal systems with Message Queuing service enabled, as attackers can pivot from compromised systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has confirmed exploitation is more likely due to the high CVSS score and unauthenticated nature. No public proof-of-concept available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in May 2023 Patch Tuesday

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24943

Restart Required: Yes

Instructions:

1. Apply May 2023 Windows security updates. 2. For Windows Server 2008/2012, apply extended security updates if eligible. 3. Restart systems after patching.

🔧 Temporary Workarounds

Disable Message Queuing Service

windows

Disables the vulnerable Windows Message Queuing service to prevent exploitation.

sc config MSMQ start= disabled
sc stop MSMQ

Block PGM Ports

windows

Blocks network traffic on PGM ports (1801 TCP/UDP) to prevent remote exploitation.

netsh advfirewall firewall add rule name="Block PGM" dir=in action=block protocol=TCP localport=1801
netsh advfirewall firewall add rule name="Block PGM UDP" dir=in action=block protocol=UDP localport=1801

🧯 If You Can't Patch

  • Disable Windows Message Queuing service if not required for business operations.
  • Implement network segmentation to isolate systems with Message Queuing service from untrusted networks.

🔍 How to Verify

Check if Vulnerable:

Check if Message Queuing service is running: sc query MSMQ. If service exists and is running, system may be vulnerable if PGM is configured.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2023 security updates are installed via: wmic qfe list | findstr "KB5026372" (update KB varies by Windows version).

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with process creation from MSMQ service
  • Unexpected service crashes (Event ID 1000) related to mqsvc.exe

Network Indicators:

  • Unusual traffic on port 1801 TCP/UDP from external sources
  • PGM protocol anomalies in network traffic

SIEM Query:

source="windows" event_id=4688 process_name="*" parent_process_name="mqsvc.exe"

🔗 References

📤 Share & Export