CVE-2023-28291

8.4 HIGH

📋 TL;DR

CVE-2023-28291 is a remote code execution vulnerability in Microsoft's Raw Image Extension that allows attackers to execute arbitrary code by tricking users into opening specially crafted raw image files. This affects Windows systems with the Raw Image Extension installed, primarily putting users who process untrusted image files at risk.

💻 Affected Systems

Products:
  • Microsoft Raw Image Extension
Versions: All versions prior to the May 2023 update
Operating Systems: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Raw Image Extension to be installed from Microsoft Store. Not installed by default on most systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Limited user account compromise leading to data exfiltration, credential harvesting, or lateral movement within the network.

🟢

If Mitigated

No impact if systems are patched, users don't open untrusted raw image files, and proper application whitelisting is enforced.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction (opening a malicious file). No public exploit code has been observed as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Raw Image Extension version 2.0.0.0 or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28291

Restart Required: No

Instructions:

1. Open Microsoft Store. 2. Click 'Library' in bottom left. 3. Click 'Get updates' to update all apps. 4. Alternatively, search for 'Raw Image Extension' and update manually. 5. Verify version is 2.0.0.0 or higher.

🔧 Temporary Workarounds

Uninstall Raw Image Extension

windows

Remove the vulnerable component entirely if not needed

Get-AppxPackage *Microsoft.RawImageExtension* | Remove-AppxPackage

Block raw image file extensions

windows

Configure Windows Defender to block raw image file types

Add-MpPreference -ExclusionExtension .raw
Add-MpPreference -ExclusionExtension .cr2
Add-MpPreference -ExclusionExtension .nef
Add-MpPreference -ExclusionExtension .arw

🧯 If You Can't Patch

  • Disable Raw Image Extension via Group Policy or registry settings
  • Implement application control policies to block execution of Raw Image Extension

🔍 How to Verify

Check if Vulnerable:

Check Raw Image Extension version in Microsoft Store or via PowerShell: Get-AppxPackage *Microsoft.RawImageExtension* | Select Version

Check Version:

Get-AppxPackage *Microsoft.RawImageExtension* | Select Version

Verify Fix Applied:

Confirm version is 2.0.0.0 or higher using same PowerShell command

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing Raw Image Extension crashes
  • Process creation events for unexpected child processes from Microsoft.Photos.exe

Network Indicators:

  • Unusual outbound connections from systems after opening image files
  • DNS queries to suspicious domains following image processing

SIEM Query:

EventID=1 AND ParentImage LIKE '%Microsoft.Photos.exe%' AND NOT Image LIKE '%Microsoft.Photos.exe%'

🔗 References

📤 Share & Export