CVE-2023-35309

7.5 HIGH

📋 TL;DR

This vulnerability in Microsoft Message Queuing (MSMQ) allows remote attackers to execute arbitrary code on affected systems by sending specially crafted packets. It affects Windows servers and workstations with MSMQ enabled. Attackers can potentially gain full control of vulnerable systems.

💻 Affected Systems

Products:
  • Microsoft Message Queuing (MSMQ)
Versions: Multiple Windows versions - see Microsoft advisory for specifics
Operating Systems: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Default Config Vulnerable: ✅ No
Notes: Only vulnerable if MSMQ service is installed and enabled. Not installed by default on most Windows versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with administrative privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to system takeover, lateral movement within networks, and data exfiltration.

🟢

If Mitigated

Limited impact due to network segmentation, strict firewall rules, and disabled MSMQ service.

🌐 Internet-Facing: HIGH - MSMQ typically listens on TCP port 1801, which if exposed to the internet allows direct exploitation.
🏢 Internal Only: MEDIUM - Requires network access but can be exploited from within the network for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. No authentication required for exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35309

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy patches through WSUS or SCCM. 3. Restart affected systems after patching.

🔧 Temporary Workarounds

Disable MSMQ Service

windows

Stop and disable the Microsoft Message Queuing service if not required

sc stop MSMQ
sc config MSMQ start= disabled

Block MSMQ Ports

all

Block TCP port 1801 and UDP port 3527 at network perimeter

🧯 If You Can't Patch

  • Disable MSMQ service on all systems where it's not essential
  • Implement strict network segmentation and firewall rules to block MSMQ traffic (TCP 1801/UDP 3527)

🔍 How to Verify

Check if Vulnerable:

Check if MSMQ service is installed and running: 'sc query MSMQ' or check Windows Features for 'Microsoft Message Queue (MSMQ) Server'

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2023 security updates are installed via 'systeminfo' or Windows Update history

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with MSMQ process creation
  • Unexpected network connections to port 1801
  • MSMQ service crash logs

Network Indicators:

  • Unusual traffic to TCP port 1801
  • Malformed MSMQ packets
  • External connections to internal MSMQ services

SIEM Query:

source="windows" event_id=4688 process_name="*msmq*" OR destination_port=1801

🔗 References

📤 Share & Export