CVE-2023-33163

7.5 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Network Load Balancing (NLB) service. Attackers can exploit this without authentication to gain SYSTEM privileges on affected servers. Organizations using Windows Server with NLB enabled are primarily affected.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2019, Windows Server 2022
Operating Systems: Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Network Load Balancing (NLB) feature is installed and enabled. NLB is not installed by default on Windows Server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges leading to complete control over affected servers, lateral movement within network, data exfiltration, and deployment of ransomware or other malware.

🟠

Likely Case

Initial foothold in network leading to privilege escalation, credential harvesting, and deployment of backdoors for persistent access.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring preventing successful exploitation or containing damage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. The vulnerability requires network access to NLB service but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: June 2023 security updates (KB5027215 for Server 2019, KB5027231 for Server 2022)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33163

Restart Required: Yes

Instructions:

1. Apply June 2023 security updates via Windows Update. 2. For manual installation, download appropriate KB from Microsoft Update Catalog. 3. Restart affected servers after patch installation.

🔧 Temporary Workarounds

Disable NLB Service

windows

Temporarily disable Network Load Balancing service if not required

Stop-Service -Name NLB
Set-Service -Name NLB -StartupType Disabled

Block NLB Ports

windows

Block network access to NLB service ports (2504, 3540, 3541 TCP/UDP)

New-NetFirewallRule -DisplayName "Block NLB" -Direction Inbound -Protocol TCP -LocalPort 2504,3540,3541 -Action Block
New-NetFirewallRule -DisplayName "Block NLB UDP" -Direction Inbound -Protocol UDP -LocalPort 2504,3540,3541 -Action Block

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate NLB servers from untrusted networks
  • Deploy intrusion detection/prevention systems to monitor for exploitation attempts on NLB ports

🔍 How to Verify

Check if Vulnerable:

Check if NLB service is installed and running: Get-WindowsFeature NLB | Select-Object Installed,Name

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify patch installation: Get-HotFix -Id KB5027215,KB5027231 | Select-Object HotFixID,InstalledOn

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4625 failed logons to NLB service
  • Unexpected process creation from NLB service
  • Network connections to NLB ports from unusual sources

Network Indicators:

  • Unusual traffic patterns to TCP/UDP ports 2504, 3540, 3541
  • Malformed NLB protocol packets
  • Connection attempts to NLB from external IPs

SIEM Query:

source="windows" event_id=4625 service_name="NLB" OR destination_port IN (2504, 3540, 3541) AND action="blocked"

🔗 References

📤 Share & Export