CVE-2023-35363

7.8 HIGH

📋 TL;DR

This Windows kernel vulnerability allows attackers to elevate privileges from a lower-privileged account to SYSTEM-level access. It affects Windows operating systems and requires local access to exploit. Attackers must already have some level of access to the target system.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configurations required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of malware, credential theft, persistence mechanisms, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install backdoors, or access sensitive data on compromised systems.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation are implemented.

🌐 Internet-Facing: LOW - Requires local access to exploit, cannot be triggered remotely over the internet.
🏢 Internal Only: HIGH - Significant risk for internal systems where attackers could gain initial access through phishing or other means, then escalate privileges.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and some level of existing privileges. CWE-122 indicates heap-based buffer overflow vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates (KB5028166 for Windows 10, KB5028185 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35363

Restart Required: Yes

Instructions:

1. Open Windows Update settings. 2. Check for updates. 3. Install July 2023 security updates. 4. Restart the system when prompted.

🔧 Temporary Workarounds

Restrict local access

windows

Limit local user accounts and implement strict access controls to reduce attack surface.

Enable Windows Defender Exploit Guard

windows

Use exploit protection to make exploitation more difficult.

🧯 If You Can't Patch

  • Implement strict least privilege principles for all user accounts
  • Deploy endpoint detection and response (EDR) solutions with behavioral monitoring

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for July 2023 security updates or use: wmic qfe list | findstr KB5028166 (or relevant KB for your OS)

Check Version:

winver

Verify Fix Applied:

Verify July 2023 security updates are installed via Windows Update history or Settings > Update & Security > View update history

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 with unusual parent processes
  • Unexpected privilege escalation events in Security logs
  • Suspicious kernel-mode driver loading

Network Indicators:

  • Unusual outbound connections from systems after local compromise
  • Lateral movement attempts from previously compromised hosts

SIEM Query:

EventID=4688 AND (NewProcessName="*cmd.exe" OR NewProcessName="*powershell.exe") AND SubjectUserName!="SYSTEM" AND TokenElevationType="%%1938"

🔗 References

📤 Share & Export