CVE-2023-28287

7.8 HIGH

📋 TL;DR

CVE-2023-28287 is a use-after-free vulnerability in Microsoft Publisher that allows remote code execution when a user opens a specially crafted Publisher file. Attackers can exploit this to execute arbitrary code with the privileges of the current user. This affects users of Microsoft Publisher on Windows systems.

💻 Affected Systems

Products:
  • Microsoft Publisher
Versions: Microsoft Publisher 2016, 2019, 2021, and Microsoft 365 Apps for Enterprise
Operating Systems: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both 32-bit and 64-bit versions. Microsoft 365 Apps for Enterprise users receive automatic updates.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the logged-in user, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to malware installation, credential theft, or data exfiltration from the compromised system.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only affecting the Publisher application itself.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious file, but can be delivered via email or web downloads.
🏢 Internal Only: HIGH - Internal users opening malicious Publisher files from network shares or email attachments can lead to widespread compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious Publisher file. No known public exploits as of last update.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security Update for Microsoft Publisher - April 11, 2023

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Click 'Check for updates'. 3. Install all available updates. 4. Restart computer if prompted. For enterprise: Deploy through WSUS, Microsoft Endpoint Configuration Manager, or Microsoft Intune.

🔧 Temporary Workarounds

Disable Publisher file opening

windows

Prevent Publisher files from opening by default to block exploitation vector

reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pub" /v "Application" /t REG_SZ /d "" /f

Block Publisher file extensions

all

Prevent malicious Publisher files from reaching users via email

🧯 If You Can't Patch

  • Restrict Publisher file execution through application control policies
  • Implement network segmentation to limit lateral movement from compromised systems

🔍 How to Verify

Check if Vulnerable:

Check Publisher version: Open Publisher > File > Account > About Publisher. If version is before April 2023 updates, system is vulnerable.

Check Version:

wmic product where "name like '%Publisher%'" get version

Verify Fix Applied:

Verify Windows Update history shows April 2023 security updates installed for Microsoft Publisher.

📡 Detection & Monitoring

Log Indicators:

  • Publisher crash logs with memory access violations
  • Unexpected Publisher process spawning child processes
  • Publisher opening files from unusual locations

Network Indicators:

  • Publisher process making unexpected outbound connections
  • DNS requests for suspicious domains from Publisher process

SIEM Query:

EventID=1 AND ParentImage="*publisher.exe" AND CommandLine="*powershell*" OR CommandLine="*cmd*"

🔗 References

📤 Share & Export