CVE-2023-35643

7.5 HIGH

📋 TL;DR

This vulnerability in the DHCP Server Service allows an attacker to read sensitive information from memory, potentially exposing credentials or other confidential data. It affects Windows Server systems running the DHCP Server role. Attackers must have network access to the DHCP server to exploit this.

💻 Affected Systems

Products:
  • Windows Server
Versions: Windows Server 2012 R2, 2016, 2019, 2022
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the DHCP Server role installed and running.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could extract sensitive information like credentials, configuration secrets, or other memory-resident data from the DHCP server, leading to lateral movement or privilege escalation.

🟠

Likely Case

Information disclosure of DHCP server configuration details or network information that could aid in further attacks.

🟢

If Mitigated

Limited exposure of non-critical information with minimal impact on operations.

🌐 Internet-Facing: MEDIUM - DHCP servers should not be internet-facing, but if they are, attackers could exploit this remotely.
🏢 Internal Only: HIGH - Internal attackers or compromised systems could exploit this to gather sensitive network information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to the DHCP server and knowledge of the vulnerability. No public exploit code is known at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply the latest Windows Server security updates from Microsoft (specific KB numbers vary by version)

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35643

Restart Required: Yes

Instructions:

1. Download and install the latest security update for your Windows Server version from Microsoft Update. 2. Restart the server to complete the installation.

🔧 Temporary Workarounds

Disable DHCP Server Service

windows

Temporarily disable the DHCP Server service if not required, but this will break DHCP functionality.

Stop-Service DHCPServer
Set-Service DHCPServer -StartupType Disabled

Restrict Network Access

windows

Use firewall rules to restrict access to the DHCP server (ports 67/UDP and 68/UDP) to only authorized clients.

New-NetFirewallRule -DisplayName "Block DHCP Except Trusted" -Direction Inbound -Protocol UDP -LocalPort 67,68 -RemoteAddress 192.168.1.0/24 -Action Allow
New-NetFirewallRule -DisplayName "Block All Other DHCP" -Direction Inbound -Protocol UDP -LocalPort 67,68 -Action Block

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate DHCP servers from untrusted networks.
  • Monitor DHCP server logs for unusual activity and implement intrusion detection.

🔍 How to Verify

Check if Vulnerable:

Check if the system is running Windows Server with DHCP Server role and has not applied the latest security updates.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify that the latest Windows Server security updates are installed and the system has been restarted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual DHCP request patterns or errors in Windows Event Logs under Applications and Services Logs > Microsoft > Windows > DHCP-Server

Network Indicators:

  • Abnormal traffic to DHCP server ports (67/UDP, 68/UDP) from unexpected sources

SIEM Query:

EventID: 1000-1999 from Source: DHCP-Server with abnormal frequency or from untrusted IPs

🔗 References

📤 Share & Export