CVE-2023-35330
📋 TL;DR
This vulnerability allows attackers to cause a denial of service (DoS) on Windows systems by exploiting improper handling of extended negotiation in certain protocols. It affects Windows servers and workstations that have vulnerable components enabled. The attack requires network access to the target system.
💻 Affected Systems
- Microsoft Windows
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system crash or service disruption requiring reboot, potentially affecting multiple users or critical services.
Likely Case
Service disruption affecting specific network services, causing temporary unavailability.
If Mitigated
Minimal impact with proper network segmentation and monitoring; potential brief service interruption.
🎯 Exploit Status
Network-based attack requiring no authentication; complexity is low once the vulnerability is understood.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Microsoft Security Update for specific KB numbers
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35330
Restart Required: Yes
Instructions:
1. Apply latest Windows security updates from Microsoft. 2. Restart affected systems. 3. Verify patch installation via Windows Update history.
🔧 Temporary Workarounds
Network Segmentation
allRestrict network access to vulnerable services using firewalls or network segmentation.
Disable Unnecessary Services
windowsDisable affected protocol components if not required for business operations.
🧯 If You Can't Patch
- Implement strict network access controls to limit exposure
- Monitor for unusual network traffic patterns and service disruptions
🔍 How to Verify
Check if Vulnerable:
Check Windows Update history for missing security patches related to CVE-2023-35330.
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify patch installation via 'systeminfo' command or Windows Update history showing the relevant KB installed.
📡 Detection & Monitoring
Log Indicators:
- Unexpected service crashes
- Increased error logs from affected protocols
- System event logs showing service failures
Network Indicators:
- Unusual negotiation patterns in network traffic
- Repeated connection attempts to vulnerable ports
SIEM Query:
EventID: 6008 OR EventID: 1000 OR Service crashes with affected protocol names