CVE-2023-28250

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Windows systems by sending specially crafted PGM (Pragmatic General Multicast) packets. It affects Windows systems with the PGM protocol enabled, primarily servers using Windows Server editions. Attackers can exploit this without authentication to gain SYSTEM-level privileges.

💻 Affected Systems

Products:
  • Windows Server 2008
  • Windows Server 2012
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
  • Windows 10
  • Windows 11
Versions: All supported versions prior to April 2023 security updates
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: PGM protocol is not enabled by default on most Windows systems; primarily affects systems where PGM has been explicitly enabled for applications like Microsoft Message Queuing (MSMQ)

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling attackers to install malware, steal data, create backdoors, or pivot to other systems in the network.

🟠

Likely Case

Remote code execution leading to ransomware deployment, data exfiltration, or botnet recruitment of vulnerable systems.

🟢

If Mitigated

Limited impact if systems are patched, network segmentation is in place, and PGM protocol is disabled on internet-facing systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted PGM packets to vulnerable systems; no authentication required

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: April 2023 security updates (KB5025229, KB5025230, etc. depending on Windows version)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28250

Restart Required: Yes

Instructions:

1. Apply April 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable PGM Protocol

windows

Disables the Pragmatic General Multicast protocol to prevent exploitation

netsh interface ipv4 set global mldlevel=none
netsh interface ipv6 set global mldlevel=none

Block PGM Ports

windows

Blocks network traffic on PGM ports to prevent remote exploitation

netsh advfirewall firewall add rule name="Block PGM" dir=in action=block protocol=udp localport=3010,3011,3012 remoteport=any

🧯 If You Can't Patch

  • Disable PGM protocol on all affected systems using administrative tools or registry settings
  • Implement network segmentation to isolate systems with PGM enabled from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check if PGM protocol is enabled: Run 'netsh interface ipv4 show global' and look for 'Multicast Level' setting. If set to anything other than 'none', system may be vulnerable if unpatched.

Check Version:

wmic qfe get hotfixid | findstr KB5025229

Verify Fix Applied:

Verify April 2023 security updates are installed: Run 'systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"Hotfix(s)"' and check for KB5025229 or later patches.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4688 (process creation) from unexpected sources
  • Event ID 4625 (failed logon) with source network address
  • Unexpected service creation or modification events

Network Indicators:

  • Unusual UDP traffic on ports 3010-3012 (PGM ports)
  • Spike in multicast traffic from external sources
  • Network scans targeting PGM ports

SIEM Query:

source="windows_security" event_id=4688 OR event_id=4625 | where dest_port=3010 OR dest_port=3011 OR dest_port=3012

🔗 References

📤 Share & Export