CVE-2023-35382

7.8 HIGH

📋 TL;DR

This is a Windows kernel use-after-free vulnerability that allows local attackers to gain SYSTEM privileges. It affects Windows systems where an authenticated user can execute code. The vulnerability enables privilege escalation from a lower-privileged account to full system control.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of supported Windows versions. Requires local access and ability to execute code.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation allowing attackers to bypass security controls, install additional malware, or access sensitive system resources.

🟢

If Mitigated

Limited impact if proper endpoint protection, least privilege principles, and network segmentation are implemented.

🌐 Internet-Facing: LOW - Requires local access and code execution, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Significant risk from insider threats, compromised user accounts, or malware that gains initial foothold.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Proof-of-concept code is publicly available. Exploitation requires local access and code execution privileges.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates (KB5028185 for Windows 10, KB5028182 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35382

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Restrict local code execution

windows

Implement application whitelisting and restrict user permissions to prevent unauthorized code execution.

Enable exploit protection

windows

Use Windows Defender Exploit Guard to apply exploit mitigation settings.

🧯 If You Can't Patch

  • Implement strict least privilege principles and restrict local administrator access
  • Deploy endpoint detection and response (EDR) solutions with behavioral monitoring

🔍 How to Verify

Check if Vulnerable:

Check Windows version and compare with patched versions. Systems without July 2023 security updates are vulnerable.

Check Version:

wmic os get caption,version,buildnumber

Verify Fix Applied:

Verify KB5028185 (Windows 10) or KB5028182 (Windows 11) is installed via 'wmic qfe list' or 'Get-HotFix' in PowerShell.

📡 Detection & Monitoring

Log Indicators:

  • Windows Security Event ID 4688 (process creation) showing privilege escalation patterns
  • Sysmon Event ID 10 (process access) with suspicious access patterns

Network Indicators:

  • Unusual outbound connections from system processes
  • Lateral movement attempts following local privilege escalation

SIEM Query:

EventID=4688 AND NewProcessName LIKE '%cmd.exe%' OR '%powershell.exe%' AND SubjectUserName!=SYSTEM AND TokenElevationType=%%1938

🔗 References

📤 Share & Export