CVE-2023-35361

7.0 HIGH

📋 TL;DR

This Windows kernel vulnerability allows an authenticated attacker to execute arbitrary code with SYSTEM privileges, potentially taking full control of affected systems. It affects Windows 10, Windows 11, and Windows Server versions. Attackers need local access to exploit this privilege escalation flaw.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2016
  • Windows Server 2019
  • Windows Server 2022
Versions: Various versions prior to July 2023 updates
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both client and server editions. Requires attacker to have valid credentials and ability to execute code on the target system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining SYSTEM privileges, installing persistent malware, accessing all data, and pivoting to other systems.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, or access protected resources.

🟢

If Mitigated

Limited impact if proper access controls, least privilege principles, and endpoint protection are implemented.

🌐 Internet-Facing: LOW - Requires local access and authentication to exploit.
🏢 Internal Only: HIGH - Malicious insiders or compromised accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access and authentication. No public exploit code has been released as of knowledge cutoff.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates (KB5028185 for Windows 10, KB5028182 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35361

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after update installation.

🔧 Temporary Workarounds

Restrict local access

windows

Limit who has local login privileges to essential personnel only

Implement least privilege

windows

Ensure users operate with minimal necessary privileges

🧯 If You Can't Patch

  • Implement strict access controls and monitor for privilege escalation attempts
  • Deploy endpoint detection and response (EDR) solutions to detect exploitation behavior

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for July 2023 security updates or run 'systeminfo' command and verify build number is patched.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify KB5028185 (Windows 10) or KB5028182 (Windows 11) is installed via 'wmic qfe list' or PowerShell 'Get-HotFix -Id KB5028185'.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 (process creation) with unusual parent-child relationships
  • Security log events showing privilege escalation

Network Indicators:

  • Unusual outbound connections from system processes

SIEM Query:

EventID=4688 AND (ParentProcessName="*cmd.exe" OR ParentProcessName="*powershell.exe") AND NewProcessName="*\system32\*"

🔗 References

📤 Share & Export