CVE-2023-35634

8.0 HIGH

📋 TL;DR

This vulnerability allows an unauthenticated attacker within Bluetooth range to execute arbitrary code on affected Windows systems by sending specially crafted packets. It affects Windows devices with Bluetooth enabled, potentially allowing full system compromise. The attacker must be within physical proximity of the target device.

💻 Affected Systems

Products:
  • Windows Bluetooth Driver
Versions: Windows 10, Windows 11, Windows Server 2022
Operating Systems: Windows 10, Windows 11, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Only vulnerable when Bluetooth is enabled and device is discoverable/paired. Windows Server typically has Bluetooth disabled by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM/administrator privileges, enabling data theft, ransomware deployment, persistence establishment, and lateral movement within the network.

🟠

Likely Case

Remote code execution with user-level privileges, allowing local privilege escalation to gain full system control and install malware.

🟢

If Mitigated

No impact if Bluetooth is disabled or device is out of physical range; limited impact with proper network segmentation and endpoint protection.

🌐 Internet-Facing: LOW - Requires physical proximity via Bluetooth (typically <100m range), not exploitable over internet.
🏢 Internal Only: MEDIUM - Exploitable within office/workspace environments where attackers could be physically present near targets.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires attacker to be within Bluetooth range and craft specific malicious packets. No authentication needed to initiate connection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates from October 2023 or later (KB5031356 for Windows 10, KB5031354 for Windows 11)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35634

Restart Required: Yes

Instructions:

1. Install Windows Update from October 2023 or later. 2. Apply security update KB5031356 (Win10) or KB5031354 (Win11). 3. Restart system to complete installation.

🔧 Temporary Workarounds

Disable Bluetooth

windows

Turn off Bluetooth functionality to prevent exploitation

Settings > Devices > Bluetooth & other devices > Turn Bluetooth Off
PowerShell: Set-Service bthserv -StartupType Disabled; Stop-Service bthserv

Disable Bluetooth Discovery

windows

Make device non-discoverable to reduce attack surface

Settings > Devices > Bluetooth & other devices > More Bluetooth options > Uncheck 'Allow Bluetooth devices to find this PC'

🧯 If You Can't Patch

  • Disable Bluetooth on all vulnerable systems immediately
  • Implement physical security controls to restrict unauthorized personnel from being within Bluetooth range of critical systems

🔍 How to Verify

Check if Vulnerable:

Check Windows version and update status: winver.exe shows build number; pre-October 2023 updates are vulnerable if Bluetooth enabled.

Check Version:

PowerShell: Get-HotFix | Where-Object {$_.HotFixID -like "KB503135*"} or systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify October 2023 security updates are installed: Settings > Update & Security > Windows Update > View update history, look for KB5031356/KB5031354.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs: Security logs showing unexpected Bluetooth connections, System logs with Bluetooth driver errors/crashes

Network Indicators:

  • Unusual Bluetooth pairing requests from unknown devices, unexpected outbound connections from Bluetooth interface

SIEM Query:

DeviceLogonEvents | where DeviceName contains "Bluetooth" and ActionType == "LogonFailed" | summarize count() by DeviceName, Timestamp

🔗 References

📤 Share & Export