BACK TO ARCHIVE
HOME/INTELLIGENCE/Critical Advisory: Resolving the CVE-2023-36884 Windows Search Remote Code Execution Vulnerability
CVE-2023-36884
7/17/2023
CVSS 9.3 • CRITICAL

Critical Advisory: Resolving the CVE-2023-36884 Windows Search Remote Code Execution Vulnerability

Microsoft Windows Search contains an unspecified vulnerability that could allow an attacker to evade Mark of the Web (MOTW) defenses via a specially crafted malicious file, leading to remote code execution.

FREQUENTLY ASKED

What is CVE-2023-36884 and why does it matter?

CVE-2023-36884 is a high-severity Remote Code Execution vulnerability in Microsoft Windows Search with a CVSS score of 7.5. It matters significantly because it allows attackers to evade Mark of the Web (MOTW) defenses via a race condition (CWE-362). This vulnerability has been actively exploited in the wild, often in conjunction with ransomware campaigns, posing a total risk to system integrity and data confidentiality.

Which versions of Windows are affected by CVE-2023-36884?

A wide range of Windows versions are affected, including various builds of Windows 10 (10.0.17763.0, 10.0.19043.0, 10.0.10240.0, 10.0.22621.0), Windows 11, and several legacy versions such as Windows 6.0.6003.0, 6.1.7601.0, 6.2.9200.0, and 6.3.9600.0. Organizations should verify their specific build numbers against the official Microsoft advisory list to ensure full coverage during remediation.

Has a patch been released for CVE-2023-36884?

Yes, Microsoft has released official security updates to address this vulnerability. The remediation steps involve applying the patches provided via the Microsoft Security Response Center (MSRC) update guide. In addition to the software updates, Microsoft initially recommended specific registry mitigations to block cross-protocol file navigation, though the definitive solution is the installation of the cumulative security updates released during the August 2023 cycle.

What is the remediation deadline and what does it mean for compliance?

The remediation deadline for CVE-2023-36884 is 2023-08-29. For federal agencies and organizations following CISA BOD 22-01, this deadline is a mandatory requirement for patching known exploited vulnerabilities. Failing to meet this deadline increases the risk of successful ransomware deployment and may result in non-compliance with cybersecurity mandates, as the vulnerability is confirmed to be under active exploitation.

How can I check if my Windows instance is affected by CVE-2023-36884?

To check if an instance is affected, administrators should verify the OS build number and the presence of the August 2023 security updates. You can use the command 'winver' or 'systeminfo' to check the current version. If the system is running any of the affected versions listed in the source data and has not been updated past the remediation deadline of 2023-08-29, it should be considered vulnerable.

THREAT SURVEY

VULNERABILITY TARGET

Windows

VENDOR SOURCE

Microsoft

CLASSIFIERS

CWE-362

REMEDIATION PULSE

Critical patching mandated by August 29, 2023.

EXPLOITATION STATUS: ACTIVE_WILDFIRE

RELATED INTELLIGENCE

View All
CVE-2023-27997

CVE-2023-27997: Critical Fortinet SSL-VPN Heap Buffer Overflow Remediation Guide

Fortinet FortiOS and FortiProxy SSL-VPN contain a heap-based buffer overflow vulnerability which can allow an unauthenticated, remote attacker to execute code or commands via specifically crafted requests.

CVE-2023-3519

CVE-2023-3519: Critical Citrix NetScaler ADC and Gateway Code Injection Advisory

Citrix NetScaler ADC and NetScaler Gateway contains a code injection vulnerability that allows for unauthenticated remote code execution.

CVE-2023-38035

CVE-2023-38035: Critical Ivanti Sentry Authentication Bypass Vulnerability Advisory

Ivanti Sentry, formerly known as MobileIron Sentry, contains an authentication bypass vulnerability that may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.

Defend the Architecture.

Real-time intelligence drops for the global software supply chain.

Technical Executive Summary

CVE-2023-36884 is a high-severity Remote Code Execution (RCE) vulnerability impacting Microsoft Windows Search. Characterized by a CVSS 3.1 score of 7.5 and a critical EPSS score of 0.9322 (99.8th percentile), this flaw represents a significant threat to enterprise environments. The vulnerability stems from a race condition (CWE-362) that allows an attacker to bypass the Mark of the Web (MOTW) security feature, which typically flags files originating from the internet as untrusted. Given its active exploitation status and known utilization by ransomware actors, immediate remediation is mandatory for all affected Windows deployments before the 2023-08-29 deadline.

Vulnerability Profile

FieldValue
CVE IDCVE-2023-36884
Affected Product & VersionsWindows (10.0.17763.0, 10.0.19043.0, 10.0.22621.0, 10.0.10240.0, 6.0.6003.0, 6.1.7601.0, 6.2.9200.0, 6.3.9600.0, and others)
CVSS Score & Severity7.5 (HIGH)
CVSS Version3.1
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
Attack VectorNetwork (Network-based file delivery)
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired (Opening a crafted file)
CWE IDsCWE-362
Date Disclosed2023-07-17
Remediation Deadline2023-08-29
SSVC Exploitation statusActive
Known Ransomware UseYes
EPSS Score & Percentile0.9322 (99.8%)
Patch AvailableYes

Technical Deep Dive: CWE-362 and MOTW Evasion

At the core of CVE-2023-36884 is CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization, commonly known as a race condition. In the context of Windows Search, this vulnerability occurs during the processing of file handlers. When a user downloads a file from the internet, Windows normally appends a 'Zone.Identifier' NTFS stream to the file, which triggers the Mark of the Web (MOTW) warning upon execution. This warning is a crucial defensive boundary that prevents macros or untrusted binaries from running without explicit user consent.

Understanding the Race Condition Mechanism

The race condition exists in how Windows Search handles the validation of these security attributes. An attacker can craft a malicious file—often delivered through Microsoft Office documents or compressed archives—that exploits a timing window. During this window, the system checks for security attributes at the same time it initiates file execution. If the timing is manipulated correctly, the execution thread proceeds before the security check identifies the file as untrusted, thereby bypassing the MOTW warning entirely.

The Role of Mark of the Web (MOTW) in the Attack Chain

MOTW is a foundational security mechanism in the Windows ecosystem. By evading this, attackers can bypass Protected View in Office and other security blocks. The attack chain typically begins with a phishing email containing a document that leverages external references. When the document is opened, it uses the Windows Search mechanism to call a malicious payload. Because of the race condition, the system fails to apply the necessary restrictions, leading to arbitrary code execution in the context of the current user. This "Total" technical impact means the attacker gains full control over the user's session, enabling lateral movement and data exfiltration.

Who Is Affected: Impacted Systems and Compliance Requirements

This vulnerability affects an extensive range of Microsoft Windows versions, from legacy systems like Windows Vista (6.0.6003.0) and Windows 7 (6.1.7601.0) to modern iterations of Windows 10 and Windows 11. Specifically, enterprise deployments utilizing Windows 10 versions 21H2, 22H2, and various Long-Term Servicing Channels (LTSC) are at high risk.

CISA BOD 22-01 Compliance

CVE-2023-36884 is listed in the CISA Known Exploited Vulnerabilities (KEV) catalog. Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies were required to remediate this flaw by the 2023-08-29 deadline. For private sector organizations, this date serves as a critical benchmark for risk management. Given the 99.8% EPSS score, the probability of encountering an exploit attempt in a 30-day window is exceptionally high, making compliance with this deadline essential for cyber-insurance and regulatory requirements.

Official Remediation Steps

Microsoft has issued comprehensive security updates to resolve the race condition and strengthen MOTW enforcement. Organizations should follow these steps immediately:

  1. Identify Vulnerable Assets: Use vulnerability scanning tools or PowerShell scripts to identify systems running affected OS versions listed in the Source Data.
  2. Apply Cumulative Updates: Navigate to the Microsoft Security Update Guide and download the appropriate patch for your OS version. The August 2023 security updates contain the finalized fix for this issue.
  3. Registry Mitigations (Fallback Only): If immediate patching is not possible, implement the recommended registry change to block cross-protocol file navigation. Create a registry key at HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BLOCK_CROSS_PROTOCOL_FILE_NAVIGATION and set the relevant application processes (e.g., Winword.exe) to a value of 1. Note that this is a mitigation, not a permanent fix.
  4. Verify Patch Deployment: After installation, verify that the build number has advanced to a patched version and ensure that the MOTW warnings are correctly appearing for files downloaded from external zones.

Security Best Practices for Windows Search Protection

Beyond patching, organizations should adopt a defense-in-depth posture to mitigate the impact of similar race condition vulnerabilities in the future:

  1. Enforce Attack Surface Reduction (ASR) Rules: Enable the ASR rule "Block all Office applications from creating child processes" to disrupt the attack chain of most RCE exploits.
  2. Strengthen Email Filtering: Implement advanced threat protection to scan for malicious attachments and external links that leverage cross-protocol navigation.
  3. Implement Least Privilege: Ensure users do not operate with administrative rights, which limits the blast radius if an RCE vulnerability like CVE-2023-36884 is successfully exploited.
  4. Monitor for MOTW Anomalies: Use Endpoint Detection and Response (EDR) tools to alert on processes that execute without a 'Zone.Identifier' or that attempt to clear the MOTW attribute rapidly.
  5. Disable Unnecessary Search Protocols: If specific search protocols or cross-protocol features are not required for business operations, disable them via Group Policy to reduce the available attack surface.
  6. Maintain High EPSS Awareness: Regularly monitor EPSS scores for vulnerabilities in the Windows ecosystem to prioritize patching for flaws that show a high probability of exploitation.