CVE-2023-36401

7.2 HIGH

📋 TL;DR

This vulnerability in Microsoft Remote Registry Service allows authenticated attackers to execute arbitrary code remotely on affected systems. It affects Windows servers and workstations where the Remote Registry service is enabled, potentially leading to full system compromise.

💻 Affected Systems

Products:
  • Microsoft Windows
Versions: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Remote Registry service to be enabled and accessible. Default configurations may be vulnerable if service is enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Privilege escalation leading to lateral movement within the network and data exfiltration.

🟢

If Mitigated

Limited impact due to network segmentation and proper authentication controls restricting access to vulnerable services.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authentication to the target system. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Apply latest Windows security updates from October 2023 or later

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36401

Restart Required: Yes

Instructions:

1. Install Windows updates via Windows Update or WSUS. 2. Apply the October 2023 security updates. 3. Restart the system to complete installation.

🔧 Temporary Workarounds

Disable Remote Registry Service

windows

Disables the vulnerable service to prevent exploitation

sc config RemoteRegistry start= disabled
sc stop RemoteRegistry

Block Remote Registry Ports

windows

Blocks network access to Remote Registry service

netsh advfirewall firewall add rule name="Block Remote Registry" dir=in action=block protocol=TCP localport=445

🧯 If You Can't Patch

  • Disable Remote Registry service on all affected systems
  • Implement network segmentation to restrict access to vulnerable systems

🔍 How to Verify

Check if Vulnerable:

Check if Remote Registry service is running and system has not received October 2023 security updates

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify Windows Update history shows October 2023 security updates installed

📡 Detection & Monitoring

Log Indicators:

  • Unusual Remote Registry service activity
  • Failed authentication attempts to Remote Registry
  • Process creation from Remote Registry service

Network Indicators:

  • Unusual SMB traffic to port 445
  • Remote Registry protocol anomalies

SIEM Query:

source="windows" AND (event_id=4625 OR event_id=4688) AND process_name="svchost.exe" AND service_name="RemoteRegistry"

🔗 References

📤 Share & Export