CVE-2023-36705
📋 TL;DR
This Windows Installer vulnerability allows attackers to elevate privileges on affected systems by exploiting improper handling of file operations. It affects Windows systems where an attacker can execute code with limited privileges. Successful exploitation enables attackers to gain SYSTEM-level access.
💻 Affected Systems
- Windows Installer
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
Windows 11 23h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with SYSTEM privileges, enabling installation of persistent malware, credential theft, and lateral movement across the network.
Likely Case
Local privilege escalation allowing attackers to bypass security controls, install unauthorized software, and access sensitive system resources.
If Mitigated
Limited impact if proper access controls, least privilege principles, and application allowlisting are implemented.
🎯 Exploit Status
Requires local access and ability to execute code. No public exploit code available at time of analysis.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Security updates released in September 2023 Patch Tuesday
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36705
Restart Required: Yes
Instructions:
1. Apply latest Windows security updates via Windows Update. 2. For enterprise environments, deploy patches through WSUS or SCCM. 3. Verify installation via Windows Update history.
🔧 Temporary Workarounds
Disable Windows Installer service
windowsTemporarily disable Windows Installer service to prevent exploitation (may break legitimate software installation)
sc config msiserver start= disabled
net stop msiserver
Implement application control policies
windowsUse Windows Defender Application Control or AppLocker to restrict unauthorized software execution
🧯 If You Can't Patch
- Implement strict least privilege principles - ensure users run with minimal necessary permissions
- Enable Windows Defender Exploit Guard and configure Attack Surface Reduction rules
🔍 How to Verify
Check if Vulnerable:
Check Windows Update history for September 2023 security updates or use: wmic qfe list | findstr "KB"
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify KB5030217 (or later) is installed via: wmic qfe get hotfixid | findstr "KB5030217"
📡 Detection & Monitoring
Log Indicators:
- Windows Installer service unusual activity
- Event ID 11707, 11724 in Application logs
- Unexpected SYSTEM privilege escalation
Network Indicators:
- Not network exploitable - local privilege escalation only
SIEM Query:
EventID=11707 OR EventID=11724 | where ProcessName contains "msiexec" | where User contains "SYSTEM"