CVE-2023-36631
📋 TL;DR
This vulnerability allows local unprivileged users to bypass Windows Firewall restrictions through the Malwarebytes Windows Firewall Control interface. It affects users of Windows Firewall Control 6.9.2.0 who haven't enabled the password protection feature. The vendor considers this intended behavior since password protection is available.
💻 Affected Systems
- Malwarebytes Binisoft Windows Firewall Control
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access could disable firewall rules, allowing malicious network traffic to bypass security controls and potentially enabling lateral movement, data exfiltration, or remote access.
Likely Case
Local users could modify firewall rules to allow unauthorized network connections, potentially bypassing security policies for applications or services.
If Mitigated
With password protection enabled, the vulnerability is effectively mitigated as unauthorized users cannot access the rules interface.
🎯 Exploit Status
Exploitation requires local access to the system and involves using the GUI interface to modify firewall rules. No special privileges needed beyond standard user access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: N/A
Restart Required: No
Instructions:
No official patch available. The vendor considers this intended behavior. Enable password protection in Windows Firewall Control settings to mitigate.
🔧 Temporary Workarounds
Enable Password Protection
windowsSet a password in Windows Firewall Control to prevent unauthorized access to the rules interface.
Open Windows Firewall Control > Settings > General > Enable 'Password protect settings' and set a strong password
Restrict Local Access
allLimit physical and remote access to systems running vulnerable software to trusted users only.
🧯 If You Can't Patch
- Enable password protection in Windows Firewall Control immediately
- Monitor for unauthorized firewall rule changes and implement strict access controls
🔍 How to Verify
Check if Vulnerable:
Check if Windows Firewall Control 6.9.2.0 is installed and password protection is disabled in settings.
Check Version:
Check Windows Firewall Control About dialog or program properties for version information
Verify Fix Applied:
Verify password protection is enabled and test that unauthorized users cannot modify firewall rules through the interface.
📡 Detection & Monitoring
Log Indicators:
- Unexpected firewall rule modifications
- Access to Windows Firewall Control interface by non-admin users
Network Indicators:
- Unexpected network connections bypassing firewall rules
- Traffic from applications that should be blocked
SIEM Query:
Search for event logs related to firewall rule changes or access to wfc.exe by standard users