CVE-2023-41773
📋 TL;DR
CVE-2023-41773 is a remote code execution vulnerability in Microsoft's Layer 2 Tunneling Protocol implementation. An attacker could exploit this to execute arbitrary code with SYSTEM privileges on affected Windows systems. This affects Windows servers and clients with L2TP VPN functionality enabled.
💻 Affected Systems
- Windows Server
- Windows Client
📦 What is this software?
Windows 10 1507 by Microsoft
Windows 10 1607 by Microsoft
Windows 10 1809 by Microsoft
Windows 10 21h2 by Microsoft
Windows 10 22h2 by Microsoft
Windows 11 21h2 by Microsoft
Windows 11 22h2 by Microsoft
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise with SYSTEM privileges, allowing attacker to install malware, steal credentials, pivot to other systems, and maintain persistent access.
Likely Case
Ransomware deployment, data exfiltration, or creation of backdoors for future attacks on vulnerable VPN servers.
If Mitigated
Exploit attempts fail due to patched systems or disabled L2TP services, resulting in no impact.
🎯 Exploit Status
Microsoft has confirmed exploitation is more likely. The vulnerability requires no authentication and has low attack complexity.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: October 2023 security updates
Vendor Advisory: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-41773
Restart Required: Yes
Instructions:
1. Apply October 2023 Windows security updates via Windows Update. 2. For enterprise environments, deploy updates through WSUS or SCCM. 3. Restart affected systems after patch installation.
🔧 Temporary Workarounds
Disable L2TP VPN Services
windowsDisable L2TP VPN functionality if not required for business operations.
netsh routing ip nat set state disabled
sc config RemoteAccess start= disabled
sc stop RemoteAccess
Block L2TP Ports
windowsBlock UDP ports 1701 and 500 at network perimeter.
New-NetFirewallRule -DisplayName "Block L2TP" -Direction Inbound -Protocol UDP -LocalPort 1701,500 -Action Block
🧯 If You Can't Patch
- Disable L2TP VPN services on all affected systems immediately.
- Implement network segmentation to isolate VPN servers from critical assets.
🔍 How to Verify
Check if Vulnerable:
Check if L2TP VPN services are running and system has not received October 2023 security updates.
Check Version:
systeminfo | findstr /B /C:"OS Name" /C:"OS Version"
Verify Fix Applied:
Verify October 2023 security updates are installed and L2TP services are either patched or disabled.
📡 Detection & Monitoring
Log Indicators:
- Unusual L2TP connection attempts
- Failed L2TP authentication from unexpected sources
- System process creation from L2TP service
Network Indicators:
- Unexpected UDP traffic on port 1701
- L2TP protocol anomalies
- VPN connection attempts from suspicious IPs
SIEM Query:
source="windows-security" EventCode=4625 OR EventCode=4688 | where process_name contains "svchost" AND command_line contains "L2TP"