MS.Windows.Message.Queuing.Service.CVE-2023-21769.DoS

description-logoDescription

This indicates an attack attempt to exploit a Denial of Service Vulnerability in Microsoft Windows Server.
The vulnerability is due to improper handling of incoming MSMQ packets. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted MSMQ packet to a MSMQ server. Successful exploitation of this vulnerability can result in the crash of the target service.

affected-products-logoAffected Products

Microsoft Windows 10
Microsoft Windows 10 Version 1607
Microsoft Windows 10 Version 1809
Microsoft Windows 10 version 20H2
Microsoft Windows 10 Version 21H2
Microsoft Windows 10 Version 22H2
Microsoft Windows 11 Version 21H2
Microsoft Windows 11 Version 22H2
Microsoft Windows Server 2008 R2 Service Pack 1
Microsoft Windows Server 2008 R2 Service Pack 1 (Server Core installation)
Microsoft Windows Server 2008 Service Pack 2
Microsoft Windows Server 2008 Service Pack 2 (Server Core installation)
Microsoft Windows Server 2012
Microsoft Windows Server 2012 (Server Core)
Microsoft Windows Server 2012 R2
Microsoft Windows Server 2012 R2 (Server Core)
Microsoft Windows Server 2016
Microsoft Windows Server 2016 Server Core
Microsoft Windows Server 2019
Microsoft Windows Server 2019 (Server Core installation)
Microsoft Windows Server 2022
Microsoft Windows Server 2022 (Server Core installation)

Impact logoImpact

Denial of Service: Remote attackers can crash vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21769

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-06-12 24.574 Default_action:pass:drop
2023-05-17 23.556