CVE-2023-38151

8.8 HIGH

📋 TL;DR

This vulnerability in Microsoft Host Integration Server 2020 allows remote attackers to execute arbitrary code on affected systems. Attackers can exploit this without authentication to gain full control of the server. Organizations using Microsoft Host Integration Server 2020 are affected.

💻 Affected Systems

Products:
  • Microsoft Host Integration Server 2020
Versions: All versions prior to the security update
Operating Systems: Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of Host Integration Server 2020. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining SYSTEM/administrator privileges, enabling data theft, lateral movement, ransomware deployment, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to service disruption, credential harvesting, and initial foothold for further network exploitation.

🟢

If Mitigated

Limited impact due to network segmentation, strict firewall rules, and proper access controls preventing exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft rates this as 'Exploitation More Likely' in their advisory. The vulnerability requires no authentication and has low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Security update released in September 2023

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-38151

Restart Required: Yes

Instructions:

1. Download the security update from Microsoft Update Catalog. 2. Apply the update to all affected Host Integration Server 2020 instances. 3. Restart the server to complete installation.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Host Integration Server 2020 to only trusted hosts and networks

Firewall Rules

windows

Block unnecessary inbound ports to Host Integration Server using Windows Firewall or network firewall

New-NetFirewallRule -DisplayName "Block HIS Ports" -Direction Inbound -LocalPort 1433,1434 -Protocol TCP -Action Block

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Host Integration Server from untrusted networks
  • Deploy intrusion detection/prevention systems to monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check if Host Integration Server 2020 is installed and if the September 2023 security update is not applied

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Host Integration Server*"} | Select-Object Name, Version

Verify Fix Applied:

Verify the security update is installed via Windows Update history or by checking file versions

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from HIS services
  • Failed authentication attempts followed by successful exploitation
  • Windows Event Log entries showing unexpected service restarts

Network Indicators:

  • Unusual network connections from HIS server to external IPs
  • Suspicious payloads in network traffic to HIS ports

SIEM Query:

source="windows" AND (event_id=4688 OR event_id=4625) AND process_name="*his*"

🔗 References

📤 Share & Export