CVE-2023-35352

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass security features in Windows Remote Desktop, potentially gaining unauthorized access to systems. It affects Windows systems with Remote Desktop enabled, particularly those exposed to untrusted networks. The vulnerability could allow attackers to circumvent authentication or other security controls.

💻 Affected Systems

Products:
  • Windows Remote Desktop Services
  • Windows Remote Desktop Protocol
Versions: Multiple Windows versions (specific versions in Microsoft advisory)
Operating Systems: Windows Server, Windows Desktop
Default Config Vulnerable: ⚠️ Yes
Notes: Systems with Remote Desktop enabled are vulnerable. The exact affected Windows versions should be verified via Microsoft's advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via unauthorized remote access, leading to data theft, ransomware deployment, or lateral movement within networks.

🟠

Likely Case

Unauthorized access to Remote Desktop sessions, potentially allowing privilege escalation or credential harvesting.

🟢

If Mitigated

Limited impact due to network segmentation, strong authentication requirements, and proper access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation likely requires some level of access or interaction with the Remote Desktop service.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Microsoft's monthly security updates for specific KB numbers

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35352

Restart Required: Yes

Instructions:

1. Apply the latest Windows security updates from Microsoft. 2. Restart affected systems. 3. Verify the patch is installed via Windows Update history.

🔧 Temporary Workarounds

Disable Remote Desktop

windows

Temporarily disable Remote Desktop if not required

Disable via System Properties > Remote tab > uncheck 'Allow remote connections to this computer'

Network Restriction

windows

Restrict RDP access to specific IP ranges using firewall rules

New-NetFirewallRule -DisplayName 'Restrict RDP' -Direction Inbound -Protocol TCP -LocalPort 3389 -RemoteAddress 192.168.1.0/24 -Action Allow

🧯 If You Can't Patch

  • Implement Network Level Authentication (NLA) for all RDP connections
  • Use VPN for Remote Desktop access instead of direct internet exposure

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for missing security patches related to CVE-2023-35352

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify the specific KB patch is installed via 'Get-Hotfix -Id KBxxxxxxx' or Windows Update history

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful RDP connections
  • Unusual RDP connection patterns

Network Indicators:

  • RDP traffic from unexpected sources
  • Multiple RDP connection attempts

SIEM Query:

source="Security" EventCode=4625 LogonType=10 | stats count by src_ip

🔗 References

📤 Share & Export