CVE-2023-35322

8.8 HIGH

📋 TL;DR

CVE-2023-35322 is a remote code execution vulnerability in Windows Deployment Services (WDS) that allows an unauthenticated attacker to execute arbitrary code with SYSTEM privileges on affected servers. This affects organizations using Windows Deployment Services for network-based operating system deployment. The vulnerability is particularly dangerous because it can be exploited without authentication.

💻 Affected Systems

Products:
  • Windows Deployment Services
Versions: Windows Server 2012 R2 through Windows Server 2022
Operating Systems: Windows Server 2012 R2, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with Windows Deployment Services role installed and enabled. The vulnerability is in the TFTP component of WDS.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the WDS server with SYSTEM privileges, enabling lateral movement across the network, data exfiltration, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Attacker gains full control of the WDS server, potentially compromising PXE boot images and using the server as a pivot point to attack other systems on the network.

🟢

If Mitigated

Limited impact due to network segmentation, proper access controls, and monitoring that detects exploitation attempts before successful compromise.

🌐 Internet-Facing: HIGH if WDS is exposed to the internet, as unauthenticated attackers can directly exploit the vulnerability without any credentials.
🏢 Internal Only: HIGH even internally, as the vulnerability requires no authentication and could be exploited by any internal attacker or compromised internal system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has confirmed the vulnerability is being exploited in the wild. The attack requires network access to the WDS server's TFTP port (typically UDP 69).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply July 2023 or later security updates for Windows Server

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35322

Restart Required: Yes

Instructions:

1. Apply the latest Windows Server security updates from Microsoft Update. 2. Restart the server after installation. 3. Verify the patch is applied by checking system updates history.

🔧 Temporary Workarounds

Disable Windows Deployment Services

windows

Remove or disable the WDS role if not required for operations

Remove-WindowsFeature -Name WDS

Block TFTP port at network perimeter

all

Block UDP port 69 (TFTP) at firewalls to prevent external exploitation

🧯 If You Can't Patch

  • Segment WDS servers from critical network segments and implement strict network access controls
  • Monitor for unusual TFTP traffic patterns and failed exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if Windows Deployment Services role is installed and if July 2023 security updates are not applied

Check Version:

Get-WindowsFeature -Name WDS

Verify Fix Applied:

Verify July 2023 or later security updates are installed via Windows Update history or Get-HotFix PowerShell command

📡 Detection & Monitoring

Log Indicators:

  • Unusual TFTP request patterns in Windows Event Logs
  • Failed WDS service starts or crashes

Network Indicators:

  • Unusual TFTP traffic to WDS servers, especially from unexpected sources
  • TFTP requests with abnormal packet sizes or patterns

SIEM Query:

source="WinEventLog:Security" EventID=4688 AND (ProcessName="*wds*" OR CommandLine="*wds*")

🔗 References

📤 Share & Export