CVE-2023-35359

7.8 HIGH

📋 TL;DR

This Windows kernel vulnerability allows an authenticated attacker to execute arbitrary code with SYSTEM privileges, potentially taking full control of the affected system. It affects Windows operating systems and requires an attacker to have initial access to the system.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected Windows versions are vulnerable. No special configurations required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with persistent backdoor installation, credential theft, lateral movement across the network, and data exfiltration.

🟠

Likely Case

Local privilege escalation from a standard user account to SYSTEM privileges, enabling installation of malware, disabling security controls, or accessing sensitive data.

🟢

If Mitigated

Limited impact due to proper patch management, endpoint protection, and least privilege principles preventing initial access.

🌐 Internet-Facing: LOW - Requires local access; cannot be exploited remotely over the internet.
🏢 Internal Only: HIGH - Once an attacker gains initial access to a system (via phishing, malware, etc.), they can exploit this to gain full control.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploit requires local authenticated access. Proof-of-concept code has been published, making weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates (KB5028166 for Windows 10, KB5028185 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35359

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Implement least privilege principles to limit what authenticated users can do, reducing impact if exploited.

Enable exploit protection

windows

Use Windows Defender Exploit Guard or similar tools to add exploit mitigations.

🧯 If You Can't Patch

  • Implement strict endpoint detection and response (EDR) to detect privilege escalation attempts
  • Segment networks to limit lateral movement potential after exploitation

🔍 How to Verify

Check if Vulnerable:

Check if July 2023 security updates are installed via 'wmic qfe list' or 'systeminfo' command.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5028166 (Windows 10) or KB5028185 (Windows 11) or equivalent Server patches are installed.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4688 (process creation) showing unusual parent-child process relationships
  • Unexpected SYSTEM privilege processes launched from user contexts

Network Indicators:

  • Unusual outbound connections from systems after local exploitation

SIEM Query:

EventID=4688 AND NewProcessName="*" AND ParentProcessName="*" AND SubjectLogonId!=0x3e7 AND IntegrityLevel="System"

🔗 References

📤 Share & Export