CVE-2023-28229
📋 TL;DR
This vulnerability in Windows CNG Key Isolation Service allows attackers to elevate privileges from a low-privileged user account to SYSTEM level. It affects Windows systems where the CNG service is running, primarily impacting enterprise environments with multiple user accounts.
💻 Affected Systems
- Windows CNG Key Isolation Service
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 20h2 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, and persistence mechanisms.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, access sensitive data, and move laterally within networks.
If Mitigated
Limited impact if proper patch management and least privilege principles are enforced, though still a significant security risk.
🎯 Exploit Status
Microsoft has confirmed exploitation in the wild. Requires local access to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: April 2023 security updates (KB5025221 for Windows 10, KB5025239 for Windows 11, etc.)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28229
Restart Required: Yes
Instructions:
1. Apply April 2023 Windows security updates via Windows Update. 2. For enterprise: Deploy through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart affected systems after patch installation.
🔧 Temporary Workarounds
Disable CNG Key Isolation Service
windowsTemporarily disable the vulnerable service to prevent exploitation (may break cryptographic functionality)
sc config KeyIso start= disabled
sc stop KeyIso
🧯 If You Can't Patch
- Implement strict least privilege access controls to limit initial access vectors
- Monitor for suspicious process creation and privilege escalation attempts
🔍 How to Verify
Check if Vulnerable:
Check Windows version and patch level. Vulnerable if running affected Windows versions without April 2023 security updates.
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify April 2023 security updates are installed via 'systeminfo' command or Windows Update history.
📡 Detection & Monitoring
Log Indicators:
- Event ID 4688 with parent process KeyIso.exe
- Unexpected SYSTEM privilege escalation from low-privileged accounts
Network Indicators:
- Not network exploitable - focus on host-based detection
SIEM Query:
Process creation where parent_process_name contains 'KeyIso.exe' AND new_process_integrity_level = 'System'