CVE-2023-35628

8.1 HIGH

📋 TL;DR

This vulnerability in Windows MSHTML Platform allows remote attackers to execute arbitrary code by tricking users into opening specially crafted files or visiting malicious websites. It affects Windows systems with MSHTML components, primarily through web browsers and Office applications that render HTML content.

💻 Affected Systems

Products:
  • Windows
  • Microsoft Office
  • Internet Explorer
  • Edge
Versions: Windows 10, Windows 11, Windows Server 2016, 2019, 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with default MSHTML rendering enabled; Office applications using MSHTML for rendering are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining SYSTEM privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Limited user-level compromise through phishing emails or malicious websites, leading to credential theft, lateral movement, or data exfiltration.

🟢

If Mitigated

Contained impact with application sandboxing preventing system-wide compromise, though user data may still be at risk.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires user interaction but no authentication; likely to be weaponized in phishing campaigns.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates from Microsoft (e.g., KB5033372 for December 2023)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35628

Restart Required: Yes

Instructions:

1. Apply latest Windows security updates via Windows Update. 2. For enterprise, deploy patches through WSUS or SCCM. 3. Restart systems after patching.

🔧 Temporary Workarounds

Disable MSHTML in Office

windows

Prevents Office applications from using MSHTML to render web content, reducing attack surface.

Set registry key: HKCU\Software\Microsoft\Office\16.0\Common\Internet\UseWebView2ForHTML to 1

Restrict Internet Explorer

windows

Disable or restrict Internet Explorer usage as it relies heavily on MSHTML.

Use Group Policy: Computer Configuration > Administrative Templates > Windows Components > Internet Explorer > Disable Internet Explorer

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized executables from running.
  • Use network segmentation to isolate vulnerable systems and restrict internet access.

🔍 How to Verify

Check if Vulnerable:

Check Windows Update history for missing security updates related to MSHTML or CVE-2023-35628.

Check Version:

wmic os get caption, version, buildnumber

Verify Fix Applied:

Verify patch installation via 'systeminfo' command or Windows Update history showing KB5033372 or later.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 4688 (process creation) for suspicious processes like mshta.exe, powershell.exe spawning from Office apps
  • Office application crashes with MSHTML-related errors

Network Indicators:

  • Outbound connections to unknown IPs after opening Office documents or visiting websites
  • HTTP requests with unusual User-Agents from Office processes

SIEM Query:

source="windows" event_id=4688 process_name IN ("mshta.exe", "powershell.exe") parent_process_name IN ("winword.exe", "excel.exe", "iexplore.exe")

🔗 References

📤 Share & Export