CVE-2023-35342

7.8 HIGH

📋 TL;DR

This vulnerability allows an authenticated attacker to execute arbitrary code with SYSTEM privileges by exploiting a flaw in Windows Image Acquisition (WIA) service. It affects Windows systems where the WIA service is running, primarily impacting workstations and servers with imaging devices or services enabled. Attackers can escalate privileges from a lower-privileged account to full system control.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows Image Acquisition service to be running. This service is typically enabled by default on systems with imaging devices (scanners, cameras).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, lateral movement, and data exfiltration.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install backdoors, or access sensitive system resources.

🟢

If Mitigated

Limited impact if proper patch management and least privilege principles are enforced, with attackers unable to gain initial foothold.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring authenticated access to the target system.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (via phishing, credential theft, etc.), they can exploit this to gain full control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated user access and knowledge of the vulnerability. No public exploit code is available as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates (KB5028185 for Windows 10, KB5028182 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35342

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Click 'Check for updates'. 3. Install all available security updates. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Disable Windows Image Acquisition Service

windows

Disables the vulnerable service to prevent exploitation

sc config stisvc start= disabled
sc stop stisvc

Apply Least Privilege

all

Restrict user privileges to minimize attack surface

🧯 If You Can't Patch

  • Disable Windows Image Acquisition service if not required for business operations
  • Implement network segmentation and restrict lateral movement to limit impact of potential privilege escalation

🔍 How to Verify

Check if Vulnerable:

Check if July 2023 security updates are installed via 'winver' or 'systeminfo' command

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5028185 (Windows 10) or KB5028182 (Windows 11) is installed in Installed Updates

📡 Detection & Monitoring

Log Indicators:

  • Unusual WIA service activity
  • Privilege escalation attempts in security logs
  • Suspicious process creation with SYSTEM privileges

Network Indicators:

  • Lateral movement following local privilege escalation

SIEM Query:

EventID=4688 AND NewProcessName LIKE '%cmd.exe%' OR '%powershell.exe%' AND SubjectUserName!=SYSTEM AND TokenElevationType=%%1938

🔗 References

📤 Share & Export