#Vulnerabilities

Critical RCE Flaw in Windows Server PGM Protocol (CVE-2023-33953)

Vulnerabilities Reporter
1 min read

Microsoft patches a critical remote code execution vulnerability in Windows Server's multicast protocol that allows unauthenticated attackers to compromise systems.

A critical security vulnerability in Microsoft Windows Server could let attackers take control of systems remotely. Designated as CVE-2023-33953, this flaw affects the Pragmatic General Multicast (PGM) protocol implementation. Attackers could exploit it without authentication over networks. Immediate patching is required.

The vulnerability exists in Windows Server versions 2012, 2012 R2, 2016, 2019, and 2022. Client systems like Windows 10/11 are unaffected. PGM handles reliable multicast messaging for applications requiring high-throughput data distribution. When Message Queuing service runs with PGM enabled, specially crafted packets trigger memory corruption.

Microsoft assigned a CVSSv3 score of 9.8 (Critical). This reflects maximum severity across exploit metrics: network-based attacks requiring no privileges or user interaction. Successful exploitation allows arbitrary code execution with SYSTEM privileges. Enterprise environments using multicast messaging face highest risk.

Mitigation requires installing Microsoft's June 2023 security updates. Administrators should apply patches immediately via Windows Update or the Security Update Catalog. For systems where Message Queuing is unnecessary, disable the service entirely. Block TCP port 1801 and UDP port 3527 at firewalls as temporary protection.

The vulnerability was privately reported to Microsoft. Patches released on June 13, 2023 address this flaw. No public exploits were observed before patching. Microsoft's advisory confirms active exploitation remains unlikely post-update. Organizations should prioritize updating domain controllers and application servers first.

For technical details, see Microsoft's CVE-2023-33953 advisory. The June 2023 Security Update Guide lists all resolved vulnerabilities. System administrators must verify patch deployment across all affected servers immediately.

Comments

Loading comments...