CVE-2023-28236

7.8 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to execute arbitrary code with kernel privileges on Windows systems. It enables local privilege escalation from a lower-privileged account to SYSTEM-level access. Affects Windows operating systems with specific kernel components.

💻 Affected Systems

Products:
  • Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise: attacker gains full control over the system, can install persistent malware, disable security controls, access all data, and pivot to other systems.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security restrictions, install additional malware, or access protected resources on the compromised system.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation are implemented; attacker may gain elevated privileges but face additional security controls.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring initial access to the system; cannot be exploited remotely without other vulnerabilities.
🏢 Internal Only: HIGH - Once an attacker gains initial access (via phishing, credential theft, etc.), this vulnerability allows them to escalate privileges and move laterally within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to the system; exploit code has been publicly released but requires some technical skill to implement.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2023 security updates (KB5025239 for Windows 10, KB5025230 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28236

Restart Required: Yes

Instructions:

1. Apply April 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Implement least privilege principle to limit impact if exploited

Enable Windows Defender Exploit Guard

windows

Use exploit protection to mitigate kernel exploitation attempts

Set-ProcessMitigation -System -Enable CFG, ForceRelocateImages, BottomUpASLR, HighEntropyASLR

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to limit lateral movement
  • Deploy endpoint detection and response (EDR) solutions to detect privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Windows version and update status: systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"Hotfix(s)"

Check Version:

winver

Verify Fix Applied:

Verify April 2023 security updates are installed: wmic qfe list | findstr "5025239 5025230"

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with unusual parent processes
  • Security log events showing privilege escalation
  • Unexpected kernel-mode driver loads

Network Indicators:

  • Unusual outbound connections from system processes
  • Lateral movement attempts following local compromise

SIEM Query:

EventID=4688 AND (NewProcessName="*cmd.exe" OR NewProcessName="*powershell.exe") AND ParentProcessName="*svchost.exe"

🔗 References

📤 Share & Export