CVE-2023-35630

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on systems with Internet Connection Sharing (ICS) enabled by sending specially crafted packets. It affects Windows systems where ICS is configured, potentially allowing attackers to take full control of vulnerable machines. The vulnerability requires network access to the target system.

💻 Affected Systems

Products:
  • Windows 10
  • Windows 11
  • Windows Server 2019
  • Windows Server 2022
Versions: Multiple versions prior to security updates in December 2023
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Internet Connection Sharing (ICS) feature is enabled and configured.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling data theft, ransomware deployment, or creation of persistent backdoors.

🟠

Likely Case

Remote code execution leading to malware installation, credential harvesting, or lateral movement within the network.

🟢

If Mitigated

Limited impact due to network segmentation, ICS disabled, or proper patching preventing exploitation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. Attack complexity is low once network access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: December 2023 security updates (KB5033375 for Windows 10, KB5033372 for Windows 11, etc.)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35630

Restart Required: Yes

Instructions:

1. Apply December 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or Microsoft Endpoint Configuration Manager. 3. Restart systems after update installation.

🔧 Temporary Workarounds

Disable Internet Connection Sharing

windows

Turn off the ICS feature to eliminate the attack surface

netsh wlan set hostednetwork mode=disallow
Disable ICS in Network Connections settings

Network Segmentation

all

Isolate systems with ICS enabled from untrusted networks

🧯 If You Can't Patch

  • Disable Internet Connection Sharing on all affected systems
  • Implement strict network access controls to limit traffic to ICS-enabled systems

🔍 How to Verify

Check if Vulnerable:

Check if December 2023 security updates are installed via 'winver' command or Windows Update history. Verify ICS status in Network Connections.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Confirm KB5033375 (Windows 10) or KB5033372 (Windows 11) is installed via 'systeminfo' command or Windows Update.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing ICS service crashes
  • Security logs with unexpected network service activity
  • Process creation events from ICS-related services

Network Indicators:

  • Unusual traffic to ICS service ports
  • Malformed packets targeting ICS components
  • Network scanning for ICS-enabled systems

SIEM Query:

source="Windows Security" AND (event_id=4688 OR event_id=4625) AND process_name="svchost.exe" AND service_name="SharedAccess"

🔗 References

📤 Share & Export