CVE-2023-36912

7.5 HIGH

📋 TL;DR

This vulnerability in Microsoft Message Queuing (MSMQ) allows attackers to cause a denial of service by sending specially crafted malicious packets. It affects Windows systems with MSMQ enabled, potentially causing service crashes and system instability. Organizations using MSMQ for messaging services are primarily affected.

💻 Affected Systems

Products:
  • Microsoft Message Queuing (MSMQ)
Versions: Multiple Windows versions - see Microsoft advisory for specific affected versions
Operating Systems: Windows Server 2022, Windows Server 2019, Windows Server 2016, Windows 11, Windows 10
Default Config Vulnerable: ✅ No
Notes: MSMQ is not enabled by default on Windows systems. Only systems with MSMQ explicitly installed and running are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of MSMQ, potentially affecting dependent applications and causing system instability requiring reboot.

🟠

Likely Case

MSMQ service crashes, interrupting message processing and requiring service restart.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting exposure.

🌐 Internet-Facing: MEDIUM - Requires MSMQ to be exposed to untrusted networks, which is uncommon in default configurations.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to disrupt messaging services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to MSMQ service port (typically TCP 1801). No authentication required for the attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: July 2023 security updates - KB5028169 and others

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36912

Restart Required: Yes

Instructions:

1. Apply July 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy patches through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable MSMQ Service

windows

If MSMQ is not required, disable the service to eliminate the attack surface.

sc config MSMQ start= disabled
sc stop MSMQ

Block MSMQ Ports

windows

Block network access to MSMQ ports (TCP 1801, UDP 3527, TCP 2103, TCP 2105) at firewall.

netsh advfirewall firewall add rule name="Block MSMQ" dir=in action=block protocol=TCP localport=1801,2103,2105
netsh advfirewall firewall add rule name="Block MSMQ UDP" dir=in action=block protocol=UDP localport=3527

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate MSMQ servers from untrusted networks
  • Monitor MSMQ service health and restart automatically if crashes occur

🔍 How to Verify

Check if Vulnerable:

Check if MSMQ service is running: sc query MSMQ | findstr "RUNNING". If running and unpatched, system is vulnerable.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify July 2023 security updates are installed: wmic qfe list | findstr "KB5028169" or check installed updates in Control Panel.

📡 Detection & Monitoring

Log Indicators:

  • MSMQ service crash events in Windows System logs (Event ID 7031, 7034)
  • Unexpected MSMQ service restarts

Network Indicators:

  • Unusual traffic patterns to MSMQ port 1801
  • Multiple connection attempts to MSMQ from single source

SIEM Query:

EventID=7031 OR EventID=7034 AND ServiceName="MSMQ" | stats count by SourceIP, ServiceName

🔗 References

📤 Share & Export