CVE-2023-35365

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Windows systems running Routing and Remote Access Service (RRAS) without authentication. Attackers can exploit improper input validation to gain SYSTEM privileges on affected systems. Organizations using Windows servers with RRAS enabled are at risk.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2019, 2022
Operating Systems: Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when RRAS role is installed and configured. Not all Windows Server installations have this service enabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges leading to data theft, ransomware deployment, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Initial foothold for attackers to pivot through networks, deploy malware, and establish persistence on critical infrastructure.

🟢

If Mitigated

Limited impact with proper network segmentation, but still poses significant risk if RRAS is internet-facing.

🌐 Internet-Facing: HIGH - RRAS services exposed to internet are immediately vulnerable to unauthenticated remote attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this for lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 9.8 indicates critical severity with low attack complexity and no authentication required. Microsoft has confirmed exploitation is more likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35365

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows Server security updates via Windows Update. 2. For manual installation, download appropriate KB from Microsoft Update Catalog. 3. Restart affected servers after patch installation.

🔧 Temporary Workarounds

Disable RRAS Service

windows

Temporarily disable Routing and Remote Access Service if not required

sc config RemoteAccess start= disabled
sc stop RemoteAccess

Block RRAS Ports

windows

Block network access to RRAS ports (TCP 1723, UDP 1701, UDP 500)

netsh advfirewall firewall add rule name="Block RRAS" dir=in action=block protocol=TCP localport=1723
netsh advfirewall firewall add rule name="Block RRAS UDP" dir=in action=block protocol=UDP localport=1701,500

🧯 If You Can't Patch

  • Disable RRAS service immediately if not business-critical
  • Implement strict network segmentation and firewall rules to isolate RRAS servers

🔍 How to Verify

Check if Vulnerable:

Check if RRAS service is running: sc query RemoteAccess | findstr RUNNING

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2023 security updates are installed: wmic qfe list | findstr "KB5028166"

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4625 failed logons to RRAS service
  • Unexpected process creation from svchost.exe with RRAS components
  • Windows Security logs showing exploit attempts

Network Indicators:

  • Unusual traffic to RRAS ports (1723, 1701, 500) from unexpected sources
  • Multiple failed connection attempts followed by successful exploitation

SIEM Query:

source="Windows Security" AND (event_id=4625 OR event_id=4688) AND process_name="svchost.exe" AND service_name="RemoteAccess"

🔗 References

📤 Share & Export