CVE-2023-35317

7.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to execute arbitrary code with SYSTEM privileges on Windows Server Update Service (WSUS) servers. It affects organizations running WSUS for patch management. Attackers could gain complete control over the WSUS server.

💻 Affected Systems

Products:
  • Windows Server Update Services
Versions: All supported versions prior to July 2023 updates
Operating Systems: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WSUS role installations; requires authenticated access to WSUS server.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of WSUS server allowing attackers to distribute malicious updates to all managed endpoints, leading to domain-wide compromise.

🟠

Likely Case

Attackers gain SYSTEM privileges on WSUS server, enabling lateral movement, credential theft, and persistence in the network.

🟢

If Mitigated

Limited to authenticated users only; proper network segmentation and least privilege access would contain impact to WSUS server.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access to WSUS; exploitation involves deserialization of untrusted data (CWE-502).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates for Windows Server

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35317

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows Server security updates via Windows Update
2. Restart WSUS server after patch installation
3. Verify WSUS services are running correctly post-restart

🔧 Temporary Workarounds

Restrict WSUS Access

windows

Limit network access to WSUS servers to only authorized management systems and endpoints

Configure Windows Firewall to restrict inbound connections to WSUS ports (typically 8530/8531)

Implement Least Privilege

windows

Ensure only necessary users have administrative access to WSUS console and services

Review and restrict WSUS Administrator group membership

🧯 If You Can't Patch

  • Isolate WSUS server in dedicated network segment with strict firewall rules
  • Implement application allowlisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check if July 2023 security updates are installed via 'Get-HotFix -Id KB5028168' (example KB, verify actual KB from Microsoft advisory)

Check Version:

wmic qfe list brief | findstr /i "KB5028168"

Verify Fix Applied:

Verify WSUS server version shows post-July 2023 updates installed and services are running

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns to WSUS
  • Unexpected process execution with SYSTEM privileges on WSUS server
  • WSUS service crashes or unexpected restarts

Network Indicators:

  • Unusual outbound connections from WSUS server
  • Anomalous traffic patterns to/from WSUS ports

SIEM Query:

source="Windows Security" EventID=4688 NewProcessName="powershell.exe" OR "cmd.exe" ParentProcessName="*wsus*"

🔗 References

📤 Share & Export