MSRC compact vulnerability detail

CVE-2023-35385 · Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability

No description was published by MSRC.

Severity
Critical
Impact
Remote Code Execution
CVSS
9.8 base · 8.5 temporal
Release
2023-08-08
Signals
Windows Message Queuing Remote Code Execution Exploited: No Publicly disclosed: No Exploitability: Exploitation Less Likely
CWE
Patch Diff
Loading module diff metadata...
Resolved binary override
Use this when the MSRC module name cannot be mapped automatically or the resolved binary looks wrong.
Old version New version
Description
No description was published by MSRC.
FAQ / Articles
FAQ
How could an attacker exploit this vulnerability? Successful exploitation of this vulnerability could allow an unauthenticated attacker to remotely execute code on the target server.
Mitigation
Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors might be helpful in your situation: The Windows message queuing service, which is a Windows component, needs to be enabled for a system to be exploitable by this vulnerability. This feature can be added via the Control Panel. You can check to see if there is a service running named Message Queuing and TCP port 1801 is listening on the machine.