CVE-2023-35304
📋 TL;DR
This Windows kernel vulnerability allows attackers to escalate privileges from a lower-privileged account to SYSTEM-level access. It affects Windows operating systems and requires local access to exploit. Attackers can gain complete control over affected systems.
💻 Affected Systems
- Windows 10
- Windows 11
- Windows Server 2016
- Windows Server 2019
- Windows Server 2022
📦 What is this software?
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling installation of malware, data theft, persistence mechanisms, and lateral movement across networks.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, install backdoors, or access sensitive system resources.
If Mitigated
Limited impact if proper access controls, least privilege principles, and network segmentation are implemented.
🎯 Exploit Status
Requires local access and user-level privileges to initiate. Exploit code has been publicly released.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: July 2023 security updates (KB5028185 for Windows 10, KB5028182 for Windows 11, etc.)
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35304
Restart Required: Yes
Instructions:
1. Apply July 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.
🔧 Temporary Workarounds
Restrict local user privileges
windowsImplement least privilege principles to limit user account capabilities
Enable Windows Defender Exploit Guard
windowsConfigure exploit protection to mitigate kernel exploits
🧯 If You Can't Patch
- Implement strict access controls and limit local user privileges
- Segment networks to contain potential lateral movement
🔍 How to Verify
Check if Vulnerable:
Check Windows Update history for July 2023 security updates or run: wmic qfe list | findstr KB502818
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify July 2023 security updates are installed via Windows Update or check system version with winver
📡 Detection & Monitoring
Log Indicators:
- Event ID 4688 with unusual parent processes
- Unexpected SYSTEM privilege escalation events
- Security log anomalies showing privilege changes
Network Indicators:
- Unusual outbound connections from systems after local compromise
- Lateral movement attempts from previously low-privileged accounts
SIEM Query:
EventID=4688 AND NewProcessName="*" AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1936"