CVE-2023-41773

8.1 HIGH

📋 TL;DR

CVE-2023-41773 is a remote code execution vulnerability in Microsoft's Layer 2 Tunneling Protocol implementation. An attacker could exploit this to execute arbitrary code with SYSTEM privileges on affected Windows systems. This affects Windows servers and clients with L2TP VPN functionality enabled.

💻 Affected Systems

Products:
  • Windows Server
  • Windows Client
Versions: Windows Server 2019, Windows Server 2022, Windows 10, Windows 11
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when L2TP VPN functionality is enabled and configured. Systems without L2TP services running are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with SYSTEM privileges, allowing attacker to install malware, steal credentials, pivot to other systems, and maintain persistent access.

🟠

Likely Case

Ransomware deployment, data exfiltration, or creation of backdoors for future attacks on vulnerable VPN servers.

🟢

If Mitigated

Exploit attempts fail due to patched systems or disabled L2TP services, resulting in no impact.

🌐 Internet-Facing: HIGH - VPN servers exposed to the internet are primary targets for exploitation.
🏢 Internal Only: MEDIUM - Internal VPN servers could be exploited by compromised internal hosts or attackers who have breached perimeter defenses.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Microsoft has confirmed exploitation is more likely. The vulnerability requires no authentication and has low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: October 2023 security updates

Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41773

Restart Required: Yes

Instructions:

1. Apply October 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.

🔧 Temporary Workarounds

Disable L2TP VPN Services

windows

Disable L2TP VPN functionality if not required for business operations.

netsh routing ip nat set state disabled
sc config RemoteAccess start= disabled
sc stop RemoteAccess

Block L2TP Ports

windows

Block UDP ports 1701 and 500 at network perimeter.

New-NetFirewallRule -DisplayName "Block L2TP" -Direction Inbound -Protocol UDP -LocalPort 1701,500 -Action Block

🧯 If You Can't Patch

  • Disable L2TP VPN services on all affected systems immediately.
  • Implement network segmentation to isolate VPN servers from critical assets.

🔍 How to Verify

Check if Vulnerable:

Check if L2TP VPN services are running and system has not received October 2023 security updates.

Check Version:

systeminfo | findstr /B /C:"OS Name" /C:"OS Version"

Verify Fix Applied:

Verify October 2023 security updates are installed and L2TP services are either patched or disabled.

📡 Detection & Monitoring

Log Indicators:

  • Unusual L2TP connection attempts
  • Failed L2TP authentication from unexpected sources
  • System process creation from L2TP service

Network Indicators:

  • Unexpected UDP traffic on port 1701
  • L2TP protocol anomalies
  • VPN connection attempts from suspicious IPs

SIEM Query:

source="windows-security" EventCode=4625 OR EventCode=4688 | where process_name contains "svchost" AND command_line contains "L2TP"

🔗 References

📤 Share & Export