CVE-2023-28238

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Windows systems by sending specially crafted packets to the Internet Key Exchange (IKE) protocol service. It affects Windows servers and workstations with IKE extensions enabled. Successful exploitation could lead to complete system compromise.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with IKE/IPsec VPN services enabled are vulnerable. Windows Firewall may block IKE traffic by default on some configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, enabling attacker persistence, lateral movement, and data exfiltration.

🟠

Likely Case

Remote code execution leading to malware deployment, ransomware installation, or backdoor creation on vulnerable systems.

🟢

If Mitigated

Denial of service or failed connection attempts if network filtering blocks IKE traffic.

🌐 Internet-Facing: HIGH - IKE services exposed to internet are directly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Requires network access to IKE services, but internal attackers could exploit for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending specially crafted IKE packets to vulnerable systems. No authentication needed if IKE service is accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2023 security updates (KB5025221, KB5025239, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28238

Restart Required: Yes

Instructions:

1. Apply April 2023 Windows security updates via Windows Update. 2. For enterprise: Deploy patches through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Block IKE traffic at network perimeter

windows

Prevent external exploitation by blocking UDP port 500 and UDP port 4500 at firewalls.

netsh advfirewall firewall add rule name="Block IKE" dir=in action=block protocol=UDP localport=500,4500

Disable IKE service if not needed

windows

Stop and disable the IPsec Policy Agent service to prevent IKE processing.

sc stop PolicyAgent
sc config PolicyAgent start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate systems with IKE services
  • Deploy intrusion prevention systems (IPS) with signatures for IKE protocol anomalies

🔍 How to Verify

Check if Vulnerable:

Check if system has April 2023 security updates installed via 'systeminfo' command or Windows Update history.

Check Version:

wmic qfe list | findstr KB5025221

Verify Fix Applied:

Verify KB5025221 (or equivalent for your Windows version) is installed and system has been restarted since installation.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security logs showing IKE service crashes (Event ID 1000)
  • Firewall logs showing blocked IKE traffic to port 500/4500

Network Indicators:

  • Unusual IKE protocol traffic patterns
  • Malformed IKE packets from external sources

SIEM Query:

source="windows" AND (event_id=1000 AND process_name="svchost.exe" AND service_name="PolicyAgent") OR (destination_port=500 OR destination_port=4500) AND protocol=UDP

🔗 References

📤 Share & Export