CVE-2023-35638

7.5 HIGH

📋 TL;DR

This vulnerability in the Windows DHCP Server service allows an attacker to send specially crafted packets that cause a denial of service (DoS) condition. The service crashes, preventing DHCP from assigning IP addresses to clients. This affects Windows Server systems running the DHCP Server role.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2019, 2022, and Windows Server, version 23H2
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the DHCP Server role installed and running. Client versions of Windows are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete DHCP service outage across the network, preventing new devices from joining and existing clients from renewing leases, leading to widespread network connectivity failures.

🟠

Likely Case

DHCP service crashes requiring manual restart, causing temporary IP assignment failures for new devices and lease renewals until service is restored.

🟢

If Mitigated

Service automatically restarts via Windows service recovery options, causing brief DHCP interruptions but maintaining overall network functionality.

🌐 Internet-Facing: LOW - DHCP servers should not be directly internet-facing in proper network architectures.
🏢 Internal Only: HIGH - Attackers on the internal network can exploit this to disrupt DHCP services across the entire network segment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the DHCP server port (UDP 67). No authentication is required to send the malicious packets.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security updates released in December 2023

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35638

Restart Required: Yes

Instructions:

1. Apply the December 2023 security updates from Windows Update. 2. For manual installation, download the appropriate security update from Microsoft Update Catalog. 3. Install the update and restart the server.

🔧 Temporary Workarounds

Block unauthorized DHCP traffic

all

Configure network firewalls to only allow DHCP traffic from authorized sources and networks.

Implement DHCP failover

windows

Configure DHCP failover to maintain service if primary server goes down.

🧯 If You Can't Patch

  • Segment DHCP servers on isolated network segments with strict firewall rules
  • Implement network monitoring and alerting for DHCP service crashes

🔍 How to Verify

Check if Vulnerable:

Check if DHCP Server role is installed and running on affected Windows Server versions (2019, 2022, 23H2) without December 2023 security updates.

Check Version:

wmic os get caption, version, buildnumber, osarchitecture

Verify Fix Applied:

Verify that December 2023 security updates are installed and the DHCP service is running normally.

📡 Detection & Monitoring

Log Indicators:

  • Event ID 1014 from source DhcpServer indicating service crash
  • Unexpected DHCP service restarts in System logs

Network Indicators:

  • Unusual UDP traffic to port 67 from unexpected sources
  • DHCP DISCOVER packets with malformed options

SIEM Query:

source="WinEventLog:System" AND (EventCode=1014 AND SourceName="DhcpServer") OR (EventCode=7036 AND ServiceName="DHCPServer" AND Message="stopped")

🔗 References

📤 Share & Export