CVE-2023-32084

7.5 HIGH

📋 TL;DR

CVE-2023-32084 is a denial-of-service vulnerability in HTTP.sys, the Windows HTTP protocol stack. It allows remote attackers to crash affected systems by sending specially crafted HTTP requests, causing service disruption. This affects Windows servers running IIS with HTTP.sys enabled.

💻 Affected Systems

Products:
  • Windows Server
  • Windows
Versions: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows 11, Windows 10
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with HTTP.sys enabled (default for IIS). Windows client versions are less likely to be affected in practice but technically vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash requiring reboot, leading to extended service downtime and potential data loss for in-memory applications.

🟠

Likely Case

IIS service crash causing website/application unavailability until service restart, with potential cascading failures in dependent systems.

🟢

If Mitigated

Service interruption limited to affected application pool with automatic recovery if configured, minimal business impact.

🌐 Internet-Facing: HIGH - Internet-facing Windows servers with HTTP.sys are directly exposed to exploitation attempts from any remote attacker.
🏢 Internal Only: MEDIUM - Internal servers are still vulnerable but attack surface is limited to internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. The vulnerability requires no authentication and can be triggered remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates from June 2023 or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32084

Restart Required: Yes

Instructions:

1. Apply Windows security updates from June 2023 or later. 2. For Windows Server, install via Windows Update or WSUS. 3. Restart the system to complete installation.

🔧 Temporary Workarounds

Disable HTTP.sys

windows

Remove HTTP.sys from the attack surface by disabling it if not required

sc config http start= disabled
sc stop http

Use alternative web server

windows

Switch from IIS to alternative web server not using HTTP.sys

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to affected servers
  • Deploy web application firewall (WAF) with HTTP request filtering and rate limiting

🔍 How to Verify

Check if Vulnerable:

Check Windows version and patch level via 'systeminfo' command. Vulnerable if running affected Windows version without June 2023 security updates.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version" /C:"Hotfix(s)"

Verify Fix Applied:

Verify 'systeminfo' shows June 2023 or later security updates installed and HTTP.sys service is running expected version.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1000 from IIS/W3SVC indicating crash
  • HTTP.sys error events in System logs
  • Unexpected IIS worker process termination

Network Indicators:

  • Spike in HTTP requests to server followed by service unavailability
  • Unusual HTTP request patterns from single source

SIEM Query:

source="windows" AND (event_id=1000 OR "HTTP.sys" OR "w3wp.exe crash")

🔗 References

📤 Share & Export