CVE-2023-24871
vulnerability analysis and mitigation

Overview

CVE-2023-24871 is a Windows Bluetooth Service Remote Code Execution Vulnerability that affects the Bluetooth Low Energy library in Windows. The vulnerability was discovered and reported to Microsoft, who assigned it a CVE on January 31, 2023. This high-severity vulnerability affects multiple versions of Windows including Windows 10 (20H2, 21H2, 22H2) and Windows 11 (21H2, 22H2) (NVD).

Technical details

The vulnerability is an integer overflow error in the code responsible for counting advertising sections in Bluetooth advertisement data packets. When a packet exceeds 255 sections, the counter overflows, leading to incorrect memory allocation and subsequent heap-based out-of-bounds write. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. Microsoft has classified this as CWE-190 (Integer Overflow or Wraparound) (SecurityOnline, NVD).

Impact

The vulnerability's impact is significant due to the static linking of the vulnerable library into multiple modules within the Windows Bluetooth stack, including kernel drivers and usermode DLLs used by privileged services. This enables both remote code execution (RCE) and local privilege escalation (LPE) attacks, potentially allowing attackers to execute arbitrary code without requiring authentication (SecurityOnline).

Mitigation and workarounds

Microsoft addressed this vulnerability in their March 2023 Patch Tuesday update, primarily focusing on the RCE aspect. However, the patch introduced a limitation on the number of advertising sections allowed in Bluetooth packets, which deviates from the Bluetooth standard. Notably, the LPE component remained unpatched, potentially leaving systems vulnerable to privilege escalation attacks (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management