CVE-2023-36884

7.5 HIGH

📋 TL;DR

CVE-2023-36884 is a remote code execution vulnerability in Windows Search that allows attackers to execute arbitrary code on affected systems. It affects Windows operating systems and can be exploited by sending specially crafted requests. Organizations running vulnerable Windows versions are at risk.

💻 Affected Systems

Products:
  • Windows Search
Versions: Windows 10, Windows 11, Windows Server 2019, Windows Server 2022
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Windows Search service runs by default on affected systems. Systems with Windows Search disabled are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, enabling data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Attacker gains initial foothold on network, leading to lateral movement, credential harvesting, and data exfiltration.

🟢

If Mitigated

Attack contained to isolated segment with limited impact due to network segmentation and least privilege controls.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploits have been observed in the wild. Attackers can exploit this vulnerability without user interaction.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36884

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart systems after patch installation.

🔧 Temporary Workarounds

Disable Windows Search Service

windows

Temporarily disable the Windows Search service to prevent exploitation

sc config WSearch start= disabled
sc stop WSearch

Block Network Access to Windows Search

windows

Use firewall rules to block network access to Windows Search service

netsh advfirewall firewall add rule name="Block Windows Search" dir=in action=block protocol=TCP localport=445

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable systems
  • Apply strict firewall rules to limit access to Windows Search service

🔍 How to Verify

Check if Vulnerable:

Check if Windows Search service is running and system has not applied July 2023 security updates

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2023 security updates are installed and Windows Search service version is updated

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from searchindexer.exe
  • Suspicious network connections from Windows Search service

Network Indicators:

  • Unexpected traffic to/from port 445 associated with Windows Search
  • Anomalous SMB protocol patterns

SIEM Query:

Process Creation where Image contains "searchindexer.exe" and CommandLine contains suspicious patterns

🔗 References

📤 Share & Export