CVE-2023-36397
vulnerability analysis and mitigation

Overview

Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability (CVE-2023-36397) was disclosed on November 14, 2023. This critical vulnerability affects various versions of Windows operating systems including Windows Server (2008-2022) and Windows 10/11. The vulnerability received a CVSS score of 9.8 (Critical), indicating its severe nature (Arctic Wolf, NVD).

Technical details

The vulnerability exists in the Windows Message Queuing service when running in a PGM Server environment. An unauthenticated threat actor could exploit this vulnerability by sending a specially crafted file over the network when the Windows message queuing service is running. The vulnerability is classified as a Buffer Over-read (CWE-126) issue (Arctic Wolf).

Impact

If successfully exploited, an unauthenticated attacker could achieve remote code execution on the target system. The vulnerability's critical CVSS score of 9.8 indicates potential complete compromise of the affected system's confidentiality, integrity, and availability (Arctic Wolf).

Mitigation and workarounds

Primary mitigation involves applying the security updates released by Microsoft for all affected systems. As a workaround, organizations can disable the Message Queuing (MSMQ) service if it's not required in their environment. If disabling MSMQ is not feasible, blocking inbound connections to TCP port 1801 from suspicious sources can help prevent exploitation (Arctic Wolf).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management