CVE-2023-29363

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected Windows systems by sending specially crafted PGM (Pragmatic General Multicast) packets. It affects Windows systems with the PGM protocol enabled, primarily servers using Windows Server editions. Attackers can exploit this without authentication to gain full system control.

💻 Affected Systems

Products:
  • Windows Server 2012 R2
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
  • Windows 10
  • Windows 11
Versions: All supported versions prior to May 2023 security updates
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Requires PGM protocol to be enabled. Typically only enabled on Windows Server editions configured for multicast applications. Most Windows client systems are not vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, enabling data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to initial foothold for further attacks, credential harvesting, or deployment of malware payloads.

🟢

If Mitigated

Limited impact due to network segmentation, disabled PGM protocol, or proper patch deployment preventing exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has confirmed exploitation is more likely. The vulnerability requires no authentication and has low attack complexity, making it attractive for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: May 2023 security updates (KB5026372 for Windows 10, KB5026370 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29363

Restart Required: Yes

Instructions:

1. Apply May 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable PGM Protocol

windows

Disables the Pragmatic General Multicast protocol to prevent exploitation

netsh int ipv4 set global multicastforwarding=disabled
netsh int ipv6 set global multicastforwarding=disabled

🧯 If You Can't Patch

  • Implement network segmentation to isolate systems with PGM enabled
  • Deploy network-based intrusion prevention systems to block PGM exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if PGM is enabled: netsh int ipv4 show global | findstr multicastforwarding

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify May 2023 security updates are installed: wmic qfe list | findstr KB502637

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4688 with suspicious process creation
  • Windows Defender logs showing blocked exploitation attempts

Network Indicators:

  • Unusual PGM traffic patterns
  • PGM packets with malformed headers

SIEM Query:

source="windows" event_id=4688 AND (process_name="cmd.exe" OR process_name="powershell.exe") AND parent_process="svchost.exe"

🔗 References

📤 Share & Export