On March 14, 2023, Microsoft released a security fix for a vulnerability ( CVE-2023-23392 ) in the HTTP/3 protocol stack of Microsoft Windows Server 2022 and Windows 11 systems.
This vulnerability allows a remote attacker to execute arbitrary code. Microsoft expects this vulnerability likely to be exploited soon.
Technical Details
The vulnerability exists in the HTTP/3 protocol stack of current Microsoft Windows systems. An attacker can exploit this vulnerability if the attacked system fulfils some prerequisites:
Affected Systems
Microsoft Windows Server 2022, Microsoft Windows 11 (21H2,22H2).
IoC’s
-
Recommended Solution(s)
CERT-EU strongly recommends applying the latest patches for Microsoft Windows Server 2022, focusing on Internet-facing systems first. Additionally, CERT-EU recommends applying the latest patches to systems running Microsoft Windows 11.
Mitigations
HTTP/3 support for services is a new feature in recent Windows operating systems.
A prerequisite for a server to be vulnerable is that the binding has HTTP/3 enabled, and
the server uses buffered I/O.
Therefore, disabling HTTP/3 via a registry key mitigates this vulnerability.
Furthermore, this security vulnerability report as well as its future updates will be
posted at the following link on the Barikat Current Security Vulnerability
Reports
website.
https://guvenlikzafiyet.barikat.com.tr/index.html
CVE / CWE
CVE-2023-23392
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.